Main

id

9379142

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-09-29 01:28:36

expired found date

-

created at

2024-05-30 07:44:08

updated at

2025-12-25 02:18:53

Domain name statistics

length

9

crc

35262

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

168829982

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

1

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

9598

mp size raw text

4010

mp inner links count

1

mp inner links status

20 (imported)

Open Graph

title

m417z / blog

description

A Blog About Stuff

site name

author

m417z / blog

updated

2025-12-10 06:06:13

raw text

m417z / blog – A Blog About Stuff m417z / blog A Blog About Stuff Blog About Leveraging XFG to help with reverse engineering Microsoft eXtended Flow Guard (XFG) is a control-flow integrity (CFI) technique that extends CFG with function call signatures. It was presented by Microsoft in 2019, and it’s an interesting mitigation, but this blog post isn’t going to discuss its security implications. Instead, I’m going to show how XFG can be used to help with reverse engineering. Read More A guest in another process - a story of a remote thread crash In one of my previous blog posts, Implementing Global Injection and Hooking in Windows , I wrote about my journey in implementing global DLL injection for Windhawk , the customization marketplace for Windows programs. If you haven’t read it yet, I invite you to read it, but the bottom line is that I ended up with an implementation that enumerates all processes and injects the DLL into each of them. To make sure the DLL is als...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

3189

text words

637

text unique words

278

text lines

53

text sentences

24

text paragraphs

7

text words per sentence

26

text matched phrases

2

text matched dictionaries

3

RSS

rss status

32 (unknown)

rss found date

2023-12-30 00:13:10

rss size orig

179359

rss items

10

rss spam phrases

1

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

34 (reserved: import paused pending content quality/relevance assessment after importing first 500 pages)

sitemap review version

2

sitemap urls count

13

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2023-12-30 00:12:51

sitemap process date

2025-02-03 23:52:03

sitemap first import date

-

sitemap last import date

2025-03-02 04:45:18