id
name
related bits
133
processing priority
4
site type
0 (generic, awaiting analysis)
review version
11
html import
20 (imported)
first seen date
2024-02-19 07:47:54
expired found date
-
created at
2024-06-08 15:48:25
updated at
2026-03-11 04:01:07
length
15
crc
7849
tld
2688
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
-
previous id
0
replaced with id
0
related id
-
dns primary id
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
31405
mp size raw text
14314
mp inner links count
31
mp inner links status
20 (imported)
title
description
shell-storm, shellcode, jonathan salwan, program analysis, binary analysis, reverse engineering, deobfuscation, fuzzing
image
site name
author
Jonathan Salwan
updated
2025-12-20 18:04:58
raw text
Shell-Storm Home Entries Repository Twitter Github Shell-Storm Some stuff about I'm just a guy who enjoys doing things in various low-level fields. You will find some of my work on this webpage. Blog Posts Deobfuscation 2022-02-14 - VMProtect Devirtualization 2022-02-01 - From an obfuscated function to a synthesized LLVM IR 2022-01-24 - Synthesizing (obfuscated) expressions using Triton 2019-08-14 - IDA+Triton plugin in order to extract opaque predicates 2016-10-28 - Automatic deobfuscation of the Tigress binary protection using symbolic execution and LLVM Binary Analysis 2022-10-21 - Bootstrapping code coverage on top of Triton 2016-05-18 - What kind of semantics information Triton can provide? 2015-10-12 - Code coverage using a dynamic symbolic execution 2015-06-10 - Triton (concolic execution framework) under the hood 2013-10-14 - Stack and heap overflow detection at runtime via behavior analysis and Pin 2013-08-28...
redirect type
0 (-)
block type
0 (no issues)
detected language
1 (English)
category id
index version
2025110801
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
10606
text words
1886
text unique words
727
text lines
297
text sentences
68
text paragraphs
17
text words per sentence
27
text matched phrases
18
text matched dictionaries
4
links self subdomains
0
links other subdomains
11 - static.sstic.org, boutique.ed-diamond.com, cve.mitre.org
links other domains
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
0
links ext ecommerce
0
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
30 - twitter.com, linkedin.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-20 18:04:58
rss path
rss status
1 (priority 1 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
1 (priority 1 already searched, no matches found)
sitemap review version
1
sitemap urls count
0
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
-
sitemap process date
-
sitemap first import date
-
sitemap last import date
-