Wordpress website trojanJobs
need someone to see if there is a trojan on my website
...issues on my WordPress site, likely due to the JS/Agent Trojan. The symptoms include: - Slow website performance - Unexpected pop-ups and redirects - Discovery of suspicious files/ code changes - Enhancement of anti-virus blocking mechanisms Efforts have been made to mitigate this including scanning my website with antivirus software, updating WordPress and its plugins, as well as removing suspicious files or code changes. Despite these steps, the problem persists. Thankfully, I have a backup of the site prior to Trojan detection. I'm in the need of an expert freelancer, ideally with significant experience in WordPress security and malware removal, to completely clean my website from this Trojan. This project requir...
I've encountered a pressing issue where my checkout process was compromised by a Trojan malware, disrupting the usual operations and potentially risking customer trust and data. The problem needs immediate attention and resolution. Given the urgency, I'm prioritizing efficiency and expertise. - **Primary Concern**: A Trojan has infiltrated the checkout process, necessitating thorough removal and system fortification. If you check the image, it redirects a request to
Find and remove trojan from my laptop
I'm in need of a comprehensive malware detection and removal tool that specifically targets viruses, Trojan horses, and adware on Windows platforms. The ideal candidate to develop this has: - Extensive experience in cybersecurity - Knowledge in programming for Windows - Previous work in developing detection and removal tools, particularly for viruses, Trojan horses, and adware The project's success will hinge on the tool's effectiveness in identifying and ridding the system of these specific types of malware.
Need the following data to be collected from and employee's PC or mobile device under investigation: PC Name or Device Name, If phone, need whatsapp profile name, Maybe keystrokes for at least 24 hours and geo-location. As long as we can establish who the employee is
I need to port from an Android VPN App to Windows. VPN app currently in operation, on Android, IOS. Protocols: -OpenVPN -V2ray, trojan. -Wireguard
I am seeking assistance with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. S...with setting up an intrusion detection system for my Wide Area Network (WAN) to enhance network security and protect against trojans. Specific requirements for the project include: - Configuration of the intrusion detection system - Testing and fine-tuning of the system - Implementation of necessary security measures to detect and prevent trojan attacks Ideal skills and experience for the job: - Strong knowledge of network security and trojan protection - Experience in setting up and configuring intrusion detection systems - Familiarity with WAN networks Preferred method of communication during the proj...
I am looking for a skilled professional to help me find and treat a trojan on my WordPress website. Platform: WordPress - The website is built on the WordPress platform. Origin of Trojan: Most likely free plugins - I suspect that the trojan may have originated from a specific plugin or theme, most likely a free plugin. Timeline: Within 3 days - I need the trojan to be treated within 3 days. Ideal Skills and Experience: - Experience in WordPress security and malware removal - Familiarity with identifying and resolving issues related to free plugins - Knowledge of best practices for website security and prevention of future infections
I am looking for a skilled developer to create a VPN app for both Android and iOS platforms. The ideal candidate should have experience in developing VPN applications and be familiar with the following protocols: vmess, vless, trojan & fimiliar with sspanel, v2board and xmplus. Features and Functionalities: - I am open to suggestions for specific features and functionalities for the VPN app. The developer should be able to provide recommendations and implement them accordingly. In-App Purchases or Subscriptions: - The VPN app should include in-app purchases or subscriptions. Users should have the option to upgrade to premium plans or purchase additional features within the app. Skills and Experience: - Experience in developing VPN apps for Android and iOS platforms. - Familia...
...school, kindergarten etc.). The users will be the kids. The snack is full of good a healthy fats (omega 3) complex carbs and proteins. It tastes like chocolate and has no added sugar; is vegan, organic and handcrafted and it´s energy lasts long enough, so the kids won´t be hungry for at least 3 hours. The snack is full of healthy ingredients, but tastes very delicous - this makes the snack a real trojan horse (the snack taste like chocolate but is full of healthy ingredients). We use a designed banderoles, which we put around our bars (a brown food package). To sum up, the specifics of our bars are: · We are handmade · We only use whole nuts, seeds, dryfruits and Superfoods · We receive our ingredients as one. And we process them only once. ...
I am looking for a team to develop a VPN app that supports V2ray, Trojan, and ShadowsocksR protocols. The app should be compatible with all major platforms including Windows, Mac, iOS, Android, and Linux. Requirements: - Strong experience in developing VPN apps for multiple platforms - Knowledge and expertise in V2ray, Trojan, and ShadowsocksR protocols - Ability to create a user-friendly interface with seamless functionality across all platforms In your application, please include details of your past work and experience in developing VPN apps. Additionally, provide a detailed project proposal outlining your approach to creating a robust and reliable VPN app for all platforms. This is a great opportunity for a skilled freelancer to showcase their expertise in VPN app dev...
I am looking for a C++ program expert to help me with a Trojan issue. The program should be designed to run on the Windows operating system. The level of complexity required for the program is intermediate. Ideal skills and experience: - Strong proficiency in C++ programming language - Experience in security - Familiarity with the Windows operating system
I am looking for a C++ program expert to help me with a Trojan issue. The program should be designed to run on Windows operating system. The level of complexity required for the program is intermediate. I just want add webshell and autostart only. No other is required
I am seeking a skilled programmer who can perform a source code analysis on a file that contains a trojan. The programming language used is C#. Although the file's current use in a production environment is uncertain, my main purpose for the analysis is to understand the trojan's functionality. Therefore, I require an experienced professional who is capable of identifying security vulnerabilities and comprehending the inner workings of the malicious file. If you possess the necessary skills and expertise, please contact me.
Vær venlig at Tilmelde dig eller Log ind for at se detaljer.
Looking for an experienced developer to create a custom Remote Access Trojan (RAT) for security testing purposes. The ideal candidate should have expertise in RAT development and be proficient in Python, C++, and Java programming languages. The primary purpose of the development is security testing, and we require a custom RAT that is tailored to our specific needs. The project requires a high level of attention to detail and the ability to analyze and identify potential countermeasures.
I have a Wordpress website that has a recently uploaded theme from ThemeForest. I noticed that Elementor was running slow and then it kept asking me to run Elementor in SafeMode. Then I also noticed that MalwareBytes picked up that there was a coming from the website. Attached is a screenshot of (see bottom left) of what MalwareBytes is reporting back. It seems that website is marked as having a Trojan. I need someone to make sure that the instances of the , URLs, links to are removed from the site and cleaned off.
While running my app in the anti-virus tool it is showing the below errors and needs to fix. Please find the attached file for the reference. Android:Evo-gen [Trj]
I have an SSR server which is running fine and everything is good for the last 5 months, however, up to now i'm not able to use Whatsapp calls. When i'm connected to SSR VPN and receive a call from Whatsapp, it stuck at "connecting". Server: SSR with Obfs Note: if i use other VPN, Whatsapp calls works fine. I need someone who knows "SSR,VLESS with XTLS/TLS, VMESS and TROJAN" very well and can fix the issue and find the root cause as fast as possible.
V P N Expert needed Your job is to install v2ray, trojan, vmess and other vpn protocols on digital ocean servers To create admin panel so we can create users and subscriptions
We want to use v2ray protocol in Flutter. What we want is to list Vmess, Vless, Trojan, Socks, Http, Shadowsocks created v2ray configs created in v2ray from the admin panel and within the application.
I have a mcu that has an anti read data protection sytem, and i want someone to help me trojan this mcu to extract the hex file that is originally on it
Hi Ruihua Z., we are looking for an engineer to develop a prototype macOS VPN app to connect to a V2Ray or Trojan-go server. The prototype is an one-button app that connect/disconnect to/from the VPN server that we give you. The app also needs to use an app bundle ID that we specify. Will you be interested in this project?
Hi Anthony B., we are looking for an engineer to develop a prototype macOS VPN app to connect to a V2Ray or Trojan-go server. The prototype is an one-button app that connect/disconnect to/from the VPN server that we give you. The app also needs to use an app bundle ID that we specify. The deliverable includes (1) working macOS VPN app that connects and routes all device's traffic to our V2Ray or Trojan-go server; (2) full working source code including build/compile instructions. Will you be interested in this project?
I have a sand volleyball team we are naming Safe Sets. My vision is to use the Trojan brand font for our names and numbers with some creating tweaking to the Trojan logo to be volleyball focused. Open to artistic creativity!
...Golang project: I need to add Trojan-Go support to this panel. Trojan-Go github repo: Objectives: - Add Trojan-Go support with both TCP and Websocket support. This includes installing and configuring default Trojan-Go when installing x-ui with the new installer pointing to the new build... - Follow the x-ui folder structure and put Trojan-Go files in /usr/local/x-ui/bin/ if possible - Add Trojan-Go to add connection dialog and chaning options accordingly - Add Torjan-Go to edit connection dialog and chaning options accordingly - Add a new section for switching Trojan-Go version to home page just like xray version switching - Make sure removing Trojan-Go connection works and it doesn't corrupt the and
We are looking for a developer to help us to develop native VPN apps...native VPN apps for macOS and iOS based on the leaf library (). The project is to produce working prototypes that can successfully connect to a preconfigured VPN server (running Trojan-go). You will also need to meet online (Zoom) to demo the project, answer technical questions, and provide simple documentations. This project will have the potential of evolving into a long-term working relationship. The prototype app has the following requirements: - A single button for connecting/disconnecting the device to/from a specified VPN server running Trojan-go. - Use the leaf library for transport (). - The app's bundle ID should be or similar.
We want a VPN on iOS to add to our own VPN app with these characteristics: *sample project (so we can add it to our own) *It can connect on VLESS,Trojan and VMESS modes, SSH over Socks *No UI needed. Just a connect/disconnect button and the option to choose between VLESS/Trojan/VMESS/SSH and import the URL. *In SwiftUI environment. *Please check shadow rocket app as the example for the protocols at this link:
Hi I have ran a Trojan VPN on Linux VPS. It is working but when multiple ips connects at the same time to the server It gives me the error of EOF {End of File} I need someone to fix it for me with the description So next time I would be able to fix it myself. Important : I can not delete the server and install again because it is by chance that configue is working for me. I have tried the similar configuration on many servers but did not get any result. I dont have a good budget thanks for your caring in advance. The required screenshots are attached.
Name of the school is Chestnut Grove Middle School. Their mascot is a Trojan. I will be wrapping the doors & window entry ways into the school. We need to use their Trojan logo with a design in the background. I have included a vector mock up of the windows & doors in a 20th scale. I will include a SVG of the school Trojan logo I have also included a picture they supplied me with something they are looking for. Also included the SVG school logo. This is a very bad copy of their logo but it is all they had, Im sure its is a stock art you can get. PLEASE LOOK. The customer said we can use any vector Trojan and they sent me 3 examples of what they are looking for. The customer really likes the Mustangs design. Make sure the slogan says (Home of the Trojans)
Hi Sujata, I've seen that you have put a bid on a project entitled "Revision of the application in C++". I also had a look on their attachment. It contains a trojan virus. I recommand you to perform an analysis of your laptop Regards
We need a 3d render of a 7 mtr high Trojan Horse art project we are building and would like an idea of cost
I need bulid a APP, The APP is a Browser, and VPN. And we need use Firefox's open source project,And Shadowsocks V2ray Trojan
...vulnerable scenarios to protect themselves. (IDS) is a monitoring system that detects suspicious activities and generates alerts when they are detected. In our project case we are going to made script regarding IDS which will be on the cloud server. Anyone will be able to just download one time this script and run it just one time. It will be a simple script which will detect the any viruses like, TROJAN, WORMS, FILE VIRUS, TUNNELING VIRUS, ADWARE, SPYWARE, MALWARE, VIRUSES and many others. It will not just detect but it also gives a threat notification to the user about the virus or any other malicious activity. Object of Proposed Work The main object of proposed work is to provide safety to the user of about the unethical and malicious activities in their system. We are go...
Hi trojan-go service is installed on the server, we need someone to install the management panel for it and connect it to mysql. Note that it must work for trojan-go. Several versions are available on github.
Make Your Own Backdoor Trojan :- As a hacker, you want to create a backdoor Trojan, which will be delivered to the victim who is a Ubuntu user. If this backdoor is executed (on Ubuntu VM), the victim’s Ubuntu machine will connect to your Kali VM. Once you’ve got a connection, you can type any non-interactive Unix commands with options, which will be sent to the victim’s machine and executed there. In other words, you get a “reverse shell”. ( ) Your task is to write a Python program to implement this backdoor. (On Ubuntu, you will need to compile your Python program by entering “python3 <filename>.py”.) There are a few assumptions on your program: Note that "ls" and "pwd" are examples of non‐interactive comma...
I have 2 files that are getting flagged by VirusTotal as having a Trojan Malware (screenshots attached). I need to remove the malware so the files are SAFE to run. The software is a simple Windows app to swap the main button of Mouse in Windows using AutoHotKey. The files are here (EXE + AHK):
Trojan horse program creation Trojan horse program creation Trojan horse program creation Trojan horse program creation Trojan horse program creation Trojan horse program creation Trojan horse program creation
Deliverables: 2 applications Must be free of trojan and phishing malwares. A Windows 10 compatible desktop application that allows users to enter and store data, and run a simple statistical query. The application will provide a form for users to enter two-digit numbers between 00-99 and a date. Data entered is stored in a list with three columns: Left, Right and Date. For each two-digit number entered, the number will be split in two, with the leftmost digit going in the Left column, the rightmost digit into the Right column and the date in the Date column. The application will provide a second form to compute and display the frequency each digit appears in the Left and Right columns as a percentage of the total number of entries in the list. A third form will display duplicate dat...
Need a design for a photo backdrop/step and repeat for class reunion. It needs to include the phrase Corliss HS Almighty Class 1982. The mascot is a Trojan. The colors are black and gold. You can use two champagne glasses in a “cheers” position.
My server has a Trojan in it that passes out information in tcp port.
I want to clean up my server of any virus or trojan
Hi Rajesh S. What do you know about remote access trojan software. ? Something simple that would allow me to monitor my teenagers pc without them noticing. I am quite concerned about who they're talking to online . . And they wont let me touch their pcs.
Hi Rajesh S. What do you know about remote access trojan software. ? Something simple that would allow me to monitor my teenagers pc without them noticing. I am quite concerned about who they're talking to online . . And they wont let me touch their pcs.
HI I have a WordPress website which has some Virus-like Malware, Trojan and hence I am not able to access the same. Need someone who can fix it for me Sunil
I need someone who can fix the destructive version of MEMZ trojan on a windows 10 computer. Now whenever it starts up the nyan cat appears. Plz help.
Hello There, we are a dog breeding company that only breads South African Boerboels. We want a creative logo design with the same concept as the attached image (Dog with shield and swords). The other image is to give an idea of the 3rd feel that we desire the logo to have. include the name of our company "Trojan Boerboels" in an aesthetic manner. Be creative and select dark colors (aged leather for example). Best of luck!
We have cloned a Windows Server 2012R2 and want to limit the activities a user can make. Prevent a User: 1. installing new programs (e.g. programs, trojan horse etc) 2. to create new Users 3. variation of user permission 4. navigate to directries not needed Github limitations: 1. Create a new user on github and switch this user 2. If any code was checked out code with the existing user we do not want to allow download, checkout, browse the code with this user. Questions: 1. How do I know when a user has been accessing the server? 2. How do I know what activities a user has performed? 3. Are there any other security implications that I should be aware of?