Main

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

27 (unknown)

Events

first seen date

2025-10-29 12:27:54

expired found date

-

created at

2025-06-01 04:21:24

updated at

2026-02-08 08:10:52

Domain name statistics

length

14

crc

38223

tld

2910

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

179496839

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-12-20 01:50:24

Server

server bits

NGINX
GITHUB COM

server ip

185.199.109.153

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

2025-10-29 12:27:54

mp size orig

33216

mp size raw text

11809

mp inner links count

32

mp inner links status

20 (imported)

Open Graph

title

Alexander Popov

description

My personal blog about OS kernel development and security – https://a13xp0p0v.github.io/

site name

Alexander Popov

author

updated

2026-01-26 03:40:12

raw text

Alexander Popov | My personal blog about OS kernel development and security – https://a13xp0p0v.github.io/ Alexander Popov About Articles Conference Talks Articles Oct 3, 2025 [ru] Kernel-hack-drill и новый эксплойт для CVE-2024-50264 в ядре Linux Некоторые уязвимости, связанные с повреждением памяти, невероятно сложны для эксплуатации. Они могут вызывать состояния гонки, приводить к сбоям системы и накладывать разные ограничения, которые усложняют жизнь исследователя. Работа с такими «хрупкими» багами требует значительно больше времени и усилий. CVE-2024-50264 в ядре Linux — как раз одна из таких сложных уязвимостей, которая получила премию Pwnie Award 2025 в категории «Лучшее повышение привилегий» (Best Privilege Escalation). В этой статье я представлю свой проект kernel-hack-drill и покажу, как он помог мне разработать прототип эксплойта для уязвимости CVE-2024-50264. Sep 2, 2025 Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kern...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

3944

text characters

9449

text words

1740

text unique words

764

text lines

149

text sentences

94

text paragraphs

29

text words per sentence

18

text matched phrases

28

text matched dictionaries

4

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

0

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-