Unity mobile melee attack jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    12,778 unity mobile melee attack jobs found, pricing in INR

    Hi there, I am looking to hire a writer to write articles for my ... I am looking to hire a writer to write articles for my blog and write an e-book. My website and blog is [login to view URL] What would be your recommended plan of attack and budget moving forward? I have suggested a fixed price budget for an initial article. Can you write

    ₹5351 (Avg Bid)
    ₹5351 Avg Bid
    1 bids

    ...here: [login to view URL] (content only, old design and plugins was lost/reset in a recent malware attack) - Deliver a professionally presented responsive WordPress site that must have consistent look for desktop and mobile devices. - Must use Evolve Plus WordPress template I've purchased at [login to view URL] and able

    ₹27264 (Avg Bid)
    ₹27264 Avg Bid
    45 bids

    I need an Android app. I already have a design for it, I just need it to be built.

    ₹11200 (Avg Bid)
    ₹11200 Avg Bid
    12 bids
    Unity 2D Android 6 days left

    Hello! I need an coder who can finish my game for Android is 2D simple runner that must be finished (Menu scen is done and play scene is 50%) We have all Textures we need only coder.

    ₹8158 (Avg Bid)
    ₹8158 Avg Bid
    16 bids
    Trophy icon Create logo + style 5 days left

    ...yellow The colors of the *Snake: Turquoise, dark blue and yellow eyes. * We prefer that the snake will have a more friendly face, instead of a mouth with is open and in the attack position. The Cobra is a sign of awareness and meditation, so please take that into consideration please. Example pictures Fenix and Cobra snake. [login to view URL]

    ₹8172 (Avg Bid)
    Guaranteed
    ₹8172
    20 entries
    AWS Pinpoint in Unity 5 days left
    VERIFIED

    I'm looking to get Pinpoint steaming events working from Unity. [login to view URL] Either using the .NET SDK, and ensure it works on Unity IL2CPP (.NET v4.6) framework, or via REST API ([login to view URL]). Thank you

    ₹11643 (Avg Bid)
    ₹11643 Avg Bid
    6 bids
    UNITY PHONE GAME 5 days left

    We want to build a game for ios/android similar to: [login to view URL] but adding some custom stuff

    ₹212034 (Avg Bid)
    ₹212034 Avg Bid
    35 bids

    ...integration with bank account. Applying pre-testing for all website modules to ensure high level of security to eliminate any kind of cyber-attack such as sql-injection, XSS, CSRF, password dictionary attack or brute-force attack. Finally; for those interested please write a proposal and quote me a rough price in order to have more discussion about the readiness

    ₹16416 (Avg Bid)
    ₹16416 Avg Bid
    83 bids
    Trophy icon Logo Design :2 1 day left

    Design a logo for me - The Theme Of Logo is: Heart Attack- Call > Ambulance>Hospital. Choice to have a 3D Logo. Heart Attack > Call > Ambulance & Hospital Feel. Thanks

    ₹940 (Avg Bid)
    Guaranteed
    ₹940
    15 entries

    ...they have a drop down list with the type of malware that they wish to launch (Trojan Horse, AdWare, DDoS, etc.) 3. They can then select the type of attack and then launch it 4. Upon selecting the attack, the backend will be responsible for launching the respective types of attacks with that category. Ex: If chosen "Trojan Horse", the backend coordinates

    ₹14174 (Avg Bid)
    ₹14174 Avg Bid
    4 bids

    ...originally launched on December 2, 2012, then discontinued and later recreated after the website was purchased in April 2014 by Dean Jones. The site was hit with a series of DDoS attack soon afterwards. Godinterest founder Dean Jones refers to himself as a media publisher, dad, Christian, designer, and project manager. On December 20, 2017, Godinterest introduced

    ₹8831 (Avg Bid)
    ₹8831 Avg Bid
    27 bids

    Building a driving simulator on unity 2017, but the logitech SDK provided on the asset store gives a lot of issues and doesn't connect, gives errors, like cannot find path etc. I would like someone who can just create the link between unity ad the logitech G29 racing wheel, so I can control the car using the wheel for my simulator. I would prefer

    ₹58432 (Avg Bid)
    ₹58432 Avg Bid
    7 bids

    I need to develop (in Unity) a minigame prototype based on "carnival bumper cars" in which the player will face other cars. In particular, I need to implement the movement of the player and the movement of the enemies. - Top-down isometric 2D camera. - The movement of the cars will be like in a "sliding floor", where it will be a bit difficult to stop

    ₹16727 (Avg Bid)
    ₹16727 Avg Bid
    25 bids

    I need a highly experienced programmer to update my social casino source codes and upload the game in google playstore and ios as follows: 1) The source codes lacks graphics ( icons and screen shots) 2) Improve coin system, bonuses 3) work on IAP feature etc 4) replace splash screen 5) Add see more games feature 6) Add many more other features to make the app more attractive 7) Add a link that w...

    ₹15114 (Avg Bid)
    ₹15114 Avg Bid
    3 bids

    Our Startup company is based around creating cutting edge VR experiences. We are currently looking to add a Lead Developer that understands the unity framework and implementation of the VR environment. There will be several on going projects for the right developer.

    ₹85623 (Avg Bid)
    ₹85623 Avg Bid
    37 bids

    We have developed a mobile game in Unity. The sample video is shown as an attachment. The graphics assets of the game don't really go well together. We want the game's graphics to look more like that of Space Frontier's [login to view URL] Our game at the moment uses our some amateur graphics. If we like

    ₹10558 (Avg Bid)
    ₹10558 Avg Bid
    17 bids

    ...basically give them a white page connection refused, so that need to be fixed as well and any other security issues. I do get daily drops and attacks someone been trying to hack attack daily for more than 2 years. If you do get the project you must take care of all the above issues and monitor the server for 10 days and solve any issues related, if these

    ₹3182 (Avg Bid)
    ₹3182 Avg Bid
    6 bids

    I am looking for a Unity, AR developer who can help us build a POC app within a month or two. The app may utilize geolocation and we I would like to add that either ARCore or ARKit would work for us. The AR may use of both- Markerless and Marker based AR. You are more than welcome to suggest any other possible technologies-APIs. We already have the

    ₹93361 (Avg Bid)
    ₹93361 Avg Bid
    37 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18113 (Avg Bid)
    ₹18113 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids
    3D Unity Project 3 days left
    VERIFIED

    Need an expert with 3D Unity to create a basic game Budget 50$

    ₹3399 (Avg Bid)
    ₹3399 Avg Bid
    27 bids

    Hi. We are looking a very skilled Unity 3D developer. We are trying to develop a PC-based love ADV game with character making function using unity 3D model. We are thinking of shortening the development period and cost by using assets that are sold in the asset store. The reference site is as follows. [login to view URL] [login to view URL]

    ₹180503 (Avg Bid)
    ₹180503 Avg Bid
    17 bids
    BUILD A BASIC UNITY GAME 2 days left
    VERIFIED

    I need a freelancer that can use unity and deliver this project as soon as possible. It involves making a game. Please check the attached document

    ₹22418 (Avg Bid)
    ₹22418 Avg Bid
    24 bids

    I need a windows application in C# that involves preventing ARP spoofing attack according to an algorithm that i will send to you (a flow chart) The idea depends on building a trusted ARP table at the server PC and then distributing that trusted ARP table among other clients. The clients PCs will start to enter static ARP entries to their ARP Cache

    ₹19526 (Avg Bid)
    ₹19526 Avg Bid
    6 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18134 (Avg Bid)
    ₹18134 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...finding from web server log file and writing an algorithm. Detail - The 3 web server log files will be provided to you. 1) Normal users log data 2) Robots log data 3) Malicious/Attack log data. You need to find out features of mentioned web attacks from web log file which will differentiate it from robot log data and from normal users' log data. Based upon

    ₹9184 (Avg Bid)
    ₹9184 Avg Bid
    6 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18101 (Avg Bid)
    ₹18101 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹18079 (Avg Bid)
    ₹18079 Avg Bid
    1 bids

    ...compromised firmware. Security Engine may use external processing power given by external platforms, such as IBM Watson. Functionality:  effective resiliency to every low-level attack vector, based on firmware tampering;  machine learning algorithm to improve security level based on behavioural analysis;  raise alerts for security threats when firmware

    ₹41076 (Avg Bid)
    ₹41076 Avg Bid
    1 bids