Main

related bits

0

processing priority

3

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-09 14:19:40

expired found date

-

created at

2024-06-05 17:52:23

updated at

2025-04-14 13:04:00

Domain name statistics

length

14

crc

31640

tld

16

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

10736003 (put.as)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

14889

mp size raw text

3828

mp inner links count

0

mp inner links status

1 (no links)

Open Graph

title

Reverse Engineering

description

Reverse Engineering and Security for fun!

image

site name

Reverse Engineering

author

updated

2025-12-16 05:30:59

raw text

Reverse Engineering Home About Archives Crackmes Patches Tags Papers   Welcome! Reverse engineering and security for fun since 2007. Enjoy browsing around! Knock Knock! Who's There? - An NSA VM Back in 2017 (feels like ages ago) I decided to take a peek into the ShadowBrokers leaks and reverse some of the tools. I started on dewdrop simply because it had a macOS version. I made local presentations at 0xOpoSec and BSidesLisbon but those slides were never published for obvious reasons (aka live implants all over the Internet). Significant time has passed and everyone went crazy last week with the beautiful NSO exploit VM published by Project Zero, so why not ride the wave and present a simple NSA BPF VM. It is still an interesting work and you have to admire the great engineering that goes behind this code. It’s not everyday that you can take a peek at code developed by a well funded state actor. This post is only going to focus on the BPF part of the implant so you...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

category id

Podsłuchy (13)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

2974

text words

661

text unique words

361

text lines

42

text sentences

35

text paragraphs

4

text words per sentence

18

text matched phrases

4

text matched dictionaries

8

RSS

rss status

32 (unknown)

rss found date

2023-12-31 21:58:33

rss size orig

189417

rss items

203

rss spam phrases

4

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

30 (processing completed, results pushed to table crawler_sitemaps.ext_domain_sitemap_lists)

sitemap review version

1

sitemap urls count

208

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2023-12-31 21:58:33

sitemap process date

2024-11-21 02:59:09

sitemap first import date

-

sitemap last import date

-