Main

related bits

0

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2024-10-26 17:00:45

expired found date

-

created at

2024-10-26 17:00:45

updated at

2026-02-14 09:30:30

Domain name statistics

length

15

crc

3811

tld

86

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

87719371 (github.io)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

8411

mp size raw text

1574

mp inner links count

6

mp inner links status

20 (imported)

Open Graph

title

JSECU | JSECU

description

JSECU

site name

JSECU

author

updated

2026-02-08 11:25:07

raw text

JSECU | JSECU JSECU Posts About JSECU BLOG 7 days of Red — A compilation of the whole week of the 7daysofRed series all in one large blogpost. DAY1 Process Fiber Local Shellcode Execution Local shellcode execution techniques can be used by attackers to spawn malicious code from Web Cache Poisoning to Account Takeover — Starting off,this is a vulnerability that I found during a bug bounty engagement.I would split this into two parts, or two separate vulnerabilities. The First part was a web cache poisoning via X Headers.This part OpenEMR 5.0.1.3 Arbitrary File Actions — Back in 2018, a group of security researchers and I decided to try our hands at OpenEMR and find security vulnerabilities.The full report can be found here.This a very good read and I recommend reading Pentesting Workshop: Working with OWASP JuiceShop — This is a simple introduction of OWASP Juiceshop that I presented at day 2 of my pentesting workshop. It covers 5 of the OWASP top 10 and gives ex...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

SEC and Crypto [en] (228)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

1241

text words

263

text unique words

165

text lines

24

text sentences

7

text paragraphs

6

text words per sentence

37

text matched phrases

3

text matched dictionaries

4

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

40 (completed successful import of reports.txt file to table in_pages)

sitemap review version

2

sitemap urls count

10

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-10-26 17:00:45

sitemap process date

2024-10-26 17:00:46

sitemap first import date

-

sitemap last import date

2026-01-05 22:07:20