Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-09-30 02:41:22

expired found date

-

created at

2024-06-30 06:39:51

updated at

2026-02-21 16:02:10

Domain name statistics

length

7

crc

9941

tld

2688

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

173561409

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

7812

mp size raw text

4242

mp inner links count

2

mp inner links status

20 (imported)

Open Graph

title

description

cr0.org security exploits slipfest kernelsec metasm dtdumper julien tinnes

image

site name

author

Julien Tinnes

updated

2026-02-18 11:54:44

raw text

www.cr0.org, homepage of Julien Tinnes Random links Grey Goo , a tiny, available and reliable remote command execution server and client for emergency situations. Embracing modern technologies, I now have a blog. Mips xor encoder , compiled dynamically within Metasploit using Metasm and sample exploit for Linksys WRT54G . TTYtools some tty-related tools for pen-testers: a generic backdoor for programs asking interactively for a password such as sudo and a program to steal a tty from running processes. SSTIC 2008 , a short talk ("rump session") Raphaël Rigo, Romain Raboin and I gave in French about the tools we wrote after the OpenSSL/Debian advisory to remotely discover vulnerable keys in authorized_keys files, decipher SSH traffic and retrieve DSA private keys (even from non weak keys). Some of the tools are available here . We also wrote an article in this MISC issue (french). MISC issue where Stephane Duverger and I wrote about Linux kernel exploitation (r...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

3307

text words

657

text unique words

351

text lines

104

text sentences

42

text paragraphs

10

text words per sentence

15

text matched phrases

13

text matched dictionaries

6

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-