0dayfans.com
Open in
urlscan Pro
173.236.166.1
Public Scan
Effective URL: https://0dayfans.com/
Submission: On November 24 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by R3 on November 15th 2022. Valid for: 3 months.
This is the only time 0dayfans.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
ASN26347 (DREAMHOST-AS, US)
PTR: apache2-quack.wayne.dreamhost.com
0dayfans.com |
ASN16509 (AMAZON-02, US)
profile-photos.hackerone-user-content.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-210-145-228.deploy.static.akamaitechnologies.com
static1.squarespace.com |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
windows-internals.com |
ASN12876 (Online SAS, FR)
PTR: 163-172-4-236.rev.poneytelecom.eu
www.synacktiv.com |
ASN15169 (GOOGLE, US)
googleprojectzero.blogspot.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 218.34.148.146.bc.googleusercontent.com
ssd-disclosure.com |
ASN15169 (GOOGLE, US)
PTR: 243.191.196.104.bc.googleusercontent.com
labs.detectify.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 165.61.148.146.bc.googleusercontent.com
www.praetorian.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-34-210-62-107.us-west-2.compute.amazonaws.com
blog.doyensec.com |
Domain | Requested by | |
---|---|---|
8 | profile-photos.hackerone-user-content.com |
0dayfans.com
|
3 | github.blog |
0dayfans.com
|
3 | images.squarespace-cdn.com |
0dayfans.com
|
3 | 0dayfans.com |
1 redirects
0dayfans.com
|
2 | www.praetorian.com |
0dayfans.com
|
2 | labs.detectify.com |
0dayfans.com
|
2 | www.mdsec.co.uk |
0dayfans.com
|
2 | static1.squarespace.com | 2 redirects |
1 | bugs.xdavidhu.me |
0dayfans.com
|
1 | blog.doyensec.com |
0dayfans.com
|
1 | research.nccgroup.com |
0dayfans.com
|
1 | i0.wp.com |
0dayfans.com
|
1 | talosintelligence.com |
0dayfans.com
|
1 | ssd-disclosure.com |
0dayfans.com
|
1 | googleprojectzero.blogspot.com |
0dayfans.com
|
1 | www.synacktiv.com |
0dayfans.com
|
1 | windows-internals.com |
0dayfans.com
|
1 | bugs.chromium.org |
0dayfans.com
|
0 | portswigger.net Failed |
0dayfans.com
|
33 | 19 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.0dayfans.com R3 |
2022-11-15 - 2023-02-13 |
3 months | crt.sh |
analysis.chromium.org GTS CA 1D4 |
2022-10-09 - 2023-01-07 |
3 months | crt.sh |
profile-photos.hackerone-user-content.com Amazon |
2022-05-16 - 2023-06-14 |
a year | crt.sh |
*.squarespace-cdn.com R3 |
2022-10-08 - 2023-01-06 |
3 months | crt.sh |
*.windows-internals.com Encryption Everywhere DV TLS CA - G1 |
2022-09-30 - 2023-10-13 |
a year | crt.sh |
www.synacktiv.com Gandi Standard SSL CA 2 |
2022-07-12 - 2023-08-12 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-05-18 - 2023-05-18 |
a year | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2022-11-02 - 2023-01-25 |
3 months | crt.sh |
ssd-disclosure.com R3 |
2022-11-05 - 2023-02-03 |
3 months | crt.sh |
labs.detectify.com R3 |
2022-11-11 - 2023-02-09 |
3 months | crt.sh |
*.wp.com Sectigo ECC Domain Validation Secure Server CA |
2022-11-14 - 2023-12-15 |
a year | crt.sh |
tls.automattic.com R3 |
2022-10-25 - 2023-01-23 |
3 months | crt.sh |
www.praetorian.com R3 |
2022-10-03 - 2023-01-01 |
3 months | crt.sh |
blog.doyensec.com R3 |
2022-10-03 - 2023-01-01 |
3 months | crt.sh |
bugs.xdavidhu.me R3 |
2022-10-23 - 2023-01-21 |
3 months | crt.sh |
github.blog R3 |
2022-10-02 - 2022-12-31 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://0dayfans.com/
Frame ID: 67BEF131DAE07EFCE3CB353625E39542
Requests: 33 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://0dayfans.com/
HTTP 301
https://0dayfans.com/ Page URL
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Page Statistics
79 Outgoing links
These are links going to different origins than the main page.
Title: pi3 blog
Search URL Search Domain Scan URL
Title: Alexander Popov
Search URL Search Domain Scan URL
Title: Connor McGarr
Search URL Search Domain Scan URL
Title: Kangjie Lu
Search URL Search Domain Scan URL
Title: Microsoft Browser Vulnerability Research
Search URL Search Domain Scan URL
Title: Mozilla Attack & Defense
Search URL Search Domain Scan URL
Title: Atredis Partners
Search URL Search Domain Scan URL
Title: Synacktiv
Search URL Search Domain Scan URL
Title: Zero Day Initiative
Search URL Search Domain Scan URL
Title: Project Zero
Search URL Search Domain Scan URL
Title: SSLab @ Georgia Tech
Search URL Search Domain Scan URL
Title: Get the Shirt!
Search URL Search Domain Scan URL
Title: Our Weekly Podcast
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Chrome: heap-use-after-free in blink::LocalFrameView::PerformLayout (incomplete fix for CVE-2022-3199)
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: high - RubyのCGIライブラリにHTTPレスポンス分割(HTTPヘッダインジェクション)があり、秘密情報が漏洩する
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: CVE-2022-40300: SQL Injection in ManageEngine Privileged Access Management
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: An End to KASLR Bypasses?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: A dive into Microsoft Defender for Identity
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Nighthawk: With Great Power Comes Great Responsibility
Search URL Search Domain Scan URL
Title: Mind the Gap
Search URL Search Domain Scan URL
Title: high - Support Portal Takeover via Leaked API KEY (1500.00USD)
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: SSD Advisory – NETGEAR R7800 AFPD PreAuth
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Callback technologies CBFS Filter handle_ioctl_8314C null pointer dereference vulnerability
Search URL Search Domain Scan URL
Title: Callback technologies CBFS Filter handle_ioctl_83150 null pointer dereference vulnerability
Search URL Search Domain Scan URL
Title: Callback technologies CBFS Filter handle_ioctl_0x830a0_systembuffer null pointer dereference vulnerability
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Scaling security automation with Docker
Search URL Search Domain Scan URL
Title: AppleAVD: Memory Corruption in AppleAVDUserClient::decodeFrameFig
Search URL Search Domain Scan URL
Title: AppleAVD: Missing surface lock in deallocateKernelMemoryInternal
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Technical Advisory – NXP i.MX SDP_READ_DISABLE Fuse Bypass (CVE-2022-45163)
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: People Are People: Gender Equality at Praetorian
Search URL Search Domain Scan URL
Title: Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend
Search URL Search Domain Scan URL
Title: high - Ability to bypass locked Cloudflare WARP on wifi networks. (1000.00USD)
Search URL Search Domain Scan URL
Title: critical - RCE via github import (33510.00USD)
Search URL Search Domain Scan URL
Title: high - CSP-bypass XSS in project settings page (10270.00USD)
Search URL Search Domain Scan URL
Title: high - XSS: `v-safe-html` is not safe enough (6580.00USD)
Search URL Search Domain Scan URL
Title: high - New /add_contacts /remove_contacts quick commands susseptible to XSS from Customer Contact firstname/lastname fields (13950.00USD)
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing (to appear)
Search URL Search Domain Scan URL
Title: RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs (to appear)
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Stealing passwords from infosec Mastodon - without bypassing CSP
Search URL Search Domain Scan URL
Title: Microsoft Office class attribute double-free vulnerability
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Let's speak AJP
Search URL Search Domain Scan URL
Title: Double-free in libxml2 when parsing default attributes
Search URL Search Domain Scan URL
Title: libxml2: Integer overflow in xmlParseNameComplex
Search URL Search Domain Scan URL
Title: SSD Advisory – Cisco Secure Manager Appliance jwt_api_impl Hardcoded JWT Secret Elevation of Privilege
Search URL Search Domain Scan URL
Title: SSD Advisory – Cisco Secure Manager Appliance remediation_request_utils SQL Injection Remote Code Execution
Search URL Search Domain Scan URL
Title: node-saml: Signature bypass via multiple root elements
Search URL Search Domain Scan URL
Title: high - Admin can create a hidden admin account which even the owner can not detect and remove and do administrative actions on the application. (5000.00USD)
Search URL Search Domain Scan URL
Title: high - Subdomain takeover at http://test.www.midigator.com
Search URL Search Domain Scan URL
Title: high - Business Suite "Get Leads" Resulting in Revealing User Email & Phone
Search URL Search Domain Scan URL
Title: high - sensitive data exposure
Search URL Search Domain Scan URL
Title: Windows Kernel out-of-bounds reads and other issues when operating on long registry key and value names
Search URL Search Domain Scan URL
Title: Windows Kernel multiple memory corruption issues when operating on very long registry paths
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Accidental $70k Google Pixel Lock Screen Bypass
Search URL Search Domain Scan URL
Title: Foxit Reader deletePages Field Calculate use-after-free vulnerability
Search URL Search Domain Scan URL
Title: Foxit Reader annotation destroy use-after-free vulnerability
Search URL Search Domain Scan URL
Title: Foxit Reader openPlayer use-after-free vulnerability
Search URL Search Domain Scan URL
Title: Foxit Reader Optional Content Group use-after-free vulnerability
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Todas as novidades do GitHub Universe 2022
Search URL Search Domain Scan URL
Title: Everything new from GitHub Universe 2022
Search URL Search Domain Scan URL
Title: Chrome: heap-use-after-free in password_manager::WellKnownChangePasswordState::SetChangePasswordResponseCode
Search URL Search Domain Scan URL
Title: Inspector, or: How I Learned to Stop Worrying and Love Testing in Prod
Search URL Search Domain Scan URL
Title: Windows Kernel memory corruption due to type confusion of subkey index leaves in registry hives
Search URL Search Domain Scan URL
Title: critical - Apache Flink RCE via GET jar/plan API Endpoint (6000.00USD)
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://0dayfans.com/
HTTP 301
https://0dayfans.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://static1.squarespace.com/static/5894c269e4fcb5e65a1ed623/58a5b38cb3db2bd67b608658/637d484bbd6d15315428d647/1669219121378/open-wood-floor-wall-tool-shine-1015078-pxhere.com.jpg?format=1500w HTTP 301
- https://images.squarespace-cdn.com/content/5894c269e4fcb5e65a1ed623/1669154896498-14S7352E5X47TG6YT1DA/open-wood-floor-wall-tool-shine-1015078-pxhere.com.jpg?content-type=image%2Fjpeg
- https://static1.squarespace.com/static/5894c269e4fcb5e65a1ed623/58a5b38cb3db2bd67b608658/6372bce0c67b98581b79d19f/1668617750841/box-luggage-chest-picture-frame-closure-go-away-497875-pxhere.com.jpg?format=1500w HTTP 301
- https://images.squarespace-cdn.com/content/5894c269e4fcb5e65a1ed623/1668463847109-QCH2ZGMU7EIUV2BLY8JR/box-luggage-chest-picture-frame-closure-go-away-497875-pxhere.com.jpg?format=1500w&content-type=image%2Fjpeg
33 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
0dayfans.com/ Redirect Chain
|
78 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0dayfans.png
0dayfans.com/ |
50 KB 50 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
monorail.ico
bugs.chromium.org/static/images/ |
5 KB 852 B |
Image
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/000/007/724/bb067434deef370d6a0b16c2cbbc030b57c75e92_original.png/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
images.squarespace-cdn.com/content/v1/5894c269e4fcb5e65a1ed623/1487670157237-HOXHMI54TA0SZP21OY7C/ |
604 B 934 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-wood-floor-wall-tool-shine-1015078-pxhere.com.jpg
images.squarespace-cdn.com/content/5894c269e4fcb5e65a1ed623/1669154896498-14S7352E5X47TG6YT1DA/ Redirect Chain
|
559 KB 559 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
w-logo-blue-white-bg.png
windows-internals.com/wp-includes/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.synacktiv.com/en/publications/sites/default/files/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon-16x16.png
www.mdsec.co.uk/wp-content/themes/mdsec/img/favicons/ |
540 B 875 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tim-van-der-kuip-CPs2X8JYmS8-unsplash.jpg
www.mdsec.co.uk/wp-content/uploads/2019/11/ |
123 KB 124 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
googleprojectzero.blogspot.com/ |
4 KB 941 B |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/gbogkyyks4yd3ljs0znnj8j5uj4z/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OnlytheD-icon.png
ssd-disclosure.com/wp-content/uploads/2020/01/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon-01f90f6b94ec4cceb73079603f6ae4329ac68a00d055125fd7e998b2ce4d5556.ico
talosintelligence.com/assets/favicons/ |
15 KB 2 KB |
Image
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
labs.detectify.com/wp-content/themes/detectify2.0.5/ |
1 KB 926 B |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
docker-automation.png
labs.detectify.com/wp-content/uploads/2022/11/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cropped-Gwl5Lrim_400x400-1.jpg
i0.wp.com/research.nccgroup.com/wp-content/uploads/2020/07/ |
2 KB 3 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DCD_WRITE_seq.png
research.nccgroup.com/wp-content/uploads/2022/11/ |
66 KB 66 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cropped-Praetorian-Favicon-192x192.png
www.praetorian.com/wp-content/uploads/2021/01/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Praetorian_OG.jpg
www.praetorian.com/wp-content/uploads/2021/01/ |
31 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
box-luggage-chest-picture-frame-closure-go-away-497875-pxhere.com.jpg
images.squarespace-cdn.com/content/5894c269e4fcb5e65a1ed623/1668463847109-QCH2ZGMU7EIUV2BLY8JR/ Redirect Chain
|
280 KB 281 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/000/000/041/a819f0d518a4854df667be26210167805f38a6a4_original.png/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/f0hovtq73f9ap815a0r1w42bocp4/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
portswigger.net/content/images/logos/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
blog.doyensec.com/public/images/ |
766 B 2 KB |
Image
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/000/035/710/c1ae53147a025b33b7c8383200432c8b4a9b839a_original./ |
41 KB 41 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/000/005/044/ba20ca159dad308d753710d2b8ae8dd665a60b80_original.png/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/roYPkZznCDFmy4VGkFPnbDrc/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twitter-card.png
bugs.xdavidhu.me/assets/posts/2022-11-10-accidental-70k-google-pixel-lock-screen-bypass/ |
222 KB 222 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cropped-github-favicon-512.png
github.blog/wp-content/uploads/2019/01/ |
3 KB 4 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
universeheader3.png
github.blog/wp-content/uploads/2022/10/ |
1 MB 1 MB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
universeheader4.png
github.blog/wp-content/uploads/2022/10/ |
1 MB 1 MB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
86bca9490b71a481329efc85de3a82a98f6c29475f4926fd2b5fc844b96899c0
profile-photos.hackerone-user-content.com/variants/4dvu0xq9iacojs2s7fgkd3pbu87f/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- portswigger.net
- URL
- https://portswigger.net/content/images/logos/favicon.ico
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
portswigger.net/ | Name: AWSALBTGCORS Value: 1y4fsTbnxA6I1TABjt34bnFlcq/8HrdEH1chcpptx9Ry4MRCHacSnOpitavRdhS1aU/tACfSTe0mrtA98wPM1dzYCcNoMWE+o5LiOh6AK8S5rRv+XwPS3jUXQbpkUd1HxNG3JO4TMfbqAvLKgceES4j4UTWlnltSVaXTLK1y5t7x |
|
portswigger.net/ | Name: AWSALBAPP-0 Value: _remove_ |
|
portswigger.net/ | Name: AWSALBAPP-1 Value: _remove_ |
|
portswigger.net/ | Name: AWSALBAPP-2 Value: _remove_ |
|
portswigger.net/ | Name: AWSALBAPP-3 Value: _remove_ |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
0dayfans.com
blog.doyensec.com
bugs.chromium.org
bugs.xdavidhu.me
github.blog
googleprojectzero.blogspot.com
i0.wp.com
images.squarespace-cdn.com
labs.detectify.com
portswigger.net
profile-photos.hackerone-user-content.com
research.nccgroup.com
ssd-disclosure.com
static1.squarespace.com
talosintelligence.com
windows-internals.com
www.mdsec.co.uk
www.praetorian.com
www.synacktiv.com
portswigger.net
104.196.191.243
104.26.2.136
146.148.34.218
146.148.61.165
151.101.64.238
163.172.4.236
173.236.166.1
192.0.66.2
192.0.77.2
192.0.78.173
23.210.145.228
2600:9000:21f3:5c00:4:4c7d:87c0:93a1
2606:4700::6812:c73a
2606:50c0:8001::153
2607:f1c0:100f:f000::2a4
2a00:1450:4001:811::2013
2a00:1450:4001:82a::2001
34.210.62.107
03d28202901a9e1c6f27223be022ad31abe40f31a7d75f92cd36895ec9d1b60f
06ffa99303d271bb3187ff293354c9cf034c36f22379fbbc340ce30ea834eed6
3271e5c36b1830e9c8b45ee9947fb07f68f6a75a801ecf07c1bf098f37362ae7
38041addf6bbaa7665d467f7279f3b2c63de23b3b8a946f07cd015b830c71d75
47bcb7a4d0be49ce96455854bea56dd5210afdce191fe39ec34d336ba123c848
49c9b25776778ff43873cf5ebde2e1ffcd0747ad1042ac5a5306cdde3ffca8cd
4a39554cff17ec3237e6ab6b1f5c31a5ffc6f7e3e7575bf63072b362017b5068
4a479ba20ba3647d60c6ce046c80c9705946caf1133293f5f60a4f96a83c5803
506d0182002b5c2a4dd6c3306626b9134c73e10af4397e240a85c0f7d09cf167
563b4ae747fb654828723bae95da3166853853ddfa3e3c87c31c2bc395d5dcd6
67ee77f8efc0ddea41e621b7cc5814dafe61ba830ccf7316a63074060e814e4d
6bdb369337ac2496761c6f063bffea0aa6a91d4662279c399071a468251f51f0
77760f63b467020b2e8c3cf855b21939850b7515c1060a75251de84f98b71ed4
9254db01e89612f04becdc148d1688da8c8ac3bd21ce6193b9d72e88ffd99352
933e00aca47ad3993c20b274cee9437ca33e74bba568114ded7413e905505195
95962718cdbe012aa14ede782b5821b8534f10df16982c71e367e71728d1e41d
a1495da3cf3db37bf105a12658636ff628fee7b73975b9200049af7747e60b1f
ac6d95f5da44533789a4f4f01a3321ef26c9303c21b446d6ce83b0434b0eefbe
ad8d0b0bf23676acf0b9b112a101d7d58281f8d9c7de415c02069ade5d7cc322
b2a8876047284ad49502caa5014e8d95470d8481230a0e3701ae04e2e73a37d3
b3a20c201413f111c80db3557b390c53647440cb08e77f11bb6dc7b4da46d232
b3e83faeaebc9034cd9a31b47bf067a364d543f12ae387e07e541361d2e0d30a
bff1cb1d1daec3f1ab8ba6064305c46856cbfd5fae27ddde765407f0e3d568c6
d26a90e6a0f0bca579c50d8a55423f6ccb64cfe9a1777342f1abc05371dc2a04
d5c273801890ac84e2bd94f6abb1d159b21a01f2277de29280c2fc5d50115d10
de156162d0cc6c5fd78d157aa1368bfc810770d00175c6f47f0b5cf640f2bd96
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e3d893694a1014649b173c43e04387439566f6f477fa3040e0b103ff18283bba
ecec6215d897ff15df010bc611851cac22229eef36114299d6b9274ebff49099
ed3f64e42bd5105f8e2ca81152c9eaf53ce5cdb92405f8ce455d3b2901472725
f43a114b7e6b28c023618c866621c6919785bddd802aa9170d2b5f2df66da6e0
ffdfc37a81a587b41d74cefc90d4e6dbbf91a58c4f25354aeefffbfa706ea7d1