id
name
related bits
0
processing priority
3
site type
0 (generic, awaiting analysis)
review version
11
html import
20 (imported)
first seen date
2023-10-09 14:19:40
expired found date
-
created at
2024-06-05 17:52:23
updated at
2025-04-14 13:04:00
length
14
crc
31640
tld
16
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
10736003 (put.as)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
14889
mp size raw text
3828
mp inner links count
0
mp inner links status
1 (no links)
title
Reverse Engineering
description
Reverse Engineering and Security for fun!
image
site name
Reverse Engineering
author
updated
2025-12-16 05:30:59
raw text
Reverse Engineering Home About Archives Crackmes Patches Tags Papers Welcome! Reverse engineering and security for fun since 2007. Enjoy browsing around! Knock Knock! Who's There? - An NSA VM Back in 2017 (feels like ages ago) I decided to take a peek into the ShadowBrokers leaks and reverse some of the tools. I started on dewdrop simply because it had a macOS version. I made local presentations at 0xOpoSec and BSidesLisbon but those slides were never published for obvious reasons (aka live implants all over the Internet). Significant time has passed and everyone went crazy last week with the beautiful NSO exploit VM published by Project Zero, so why not ride the wave and present a simple NSA BPF VM. It is still an interesting work and you have to admire the great engineering that goes behind this code. It’s not everyday that you can take a peek at code developed by a well funded state actor. This post is only going to focus on the BPF part of the implant so you...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
index version
2025110801
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
2974
text words
661
text unique words
361
text lines
42
text sentences
35
text paragraphs
4
text words per sentence
18
text matched phrases
4
text matched dictionaries
8
rss path
rss status
32 (unknown)
rss found date
2023-12-31 21:58:33
rss size orig
189417
rss items
203
rss spam phrases
4
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)
sitemap review version
1
sitemap urls count
208
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2023-12-31 21:58:33
sitemap process date
2024-11-21 02:59:09
sitemap first import date
-
sitemap last import date
-