id
related bits
0
processing priority
3
site type
5 (wiki-type site, growing by topic rather than chronologically)
review version
11
html import
20 (imported)
first seen date
2024-09-13 23:47:44
expired found date
-
created at
2024-09-13 23:47:44
updated at
2026-02-19 13:41:09
length
16
crc
63264
tld
86
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
87719371 (github.io)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
43923
mp size raw text
17874
mp inner links count
1
mp inner links status
20 (imported)
title
alt3kx.github.io
description
image
site name
alt3kx
author
updated
2026-02-16 15:50:01
raw text
alt3kx.github.io | alt3kx alt3kx View on GitHub alt3kx.github.io RedTeamer | PentTester | Bug Bounty | 0day guy! | Researcher | Lone Wolf… https://github.com/alt3kx | @alt3kx My Exploit-db reference at: https://www.exploit-db.com/author/?a=1074 https://www.exploit-db.com/author/?a=9576 A handy collection of my public Exploits & CVE’s, all available on https://www.exploit-db.com and https://cve.mitre.org CVE’s MicroFocus Reward + Critical $XX,000 USD (Back) MicroFocus Reward (Front) [CVE-2019-10685] Prinect Archive System 2015 Release 2.6 - Cross-Site Scripting https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10685 [CVE-2018-12596] Ektron CMS 9.20 SP2 allows remote attackers to call aspx pages via the “activateuser.aspx” page https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12596 [CVE-2018-7690] A potential Remote Unauthorized Access in Micro Focus Fortify Software Security Center (SSC), versions 17.10, 17.20, 18.10 this expl...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
SEC and Crypto [en] (228)
index version
2025123101
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
13399
text words
2275
text unique words
622
text lines
455
text sentences
21
text paragraphs
6
text words per sentence
108
text matched phrases
38
text matched dictionaries
11
links self subdomains
0
links other subdomains
37 - cve.mitre.org, 2023.holidayhackchallenge.com, 2022.kringlecon.com, blog.yeswehack.com
links other domains
31 - infosec.exchange, exploit-db.com, ranges.io, sans.org, cyberskyline.com, magnetforensics.com, dojo-yeswehack.com, cyberchallenge.net, counterhackchallenges.com, aircrack-ng.org, vupen.com
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
1 - amazon.fr
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
links ext klim
0
links ext generic
0
dol status
0
dol updated
2026-02-16 15:50:01
rss path
rss status
1 (priority 1 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
1 (priority 1 already searched, no matches found)
sitemap review version
2
sitemap urls count
0
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
-
sitemap process date
-
sitemap first import date
-
sitemap last import date
-