scrollunlock.wordpress.com Open in urlscan Pro
192.0.78.13  Public Scan

Submitted URL: http://scrollunlock.wordpress.com/
Effective URL: https://scrollunlock.wordpress.com/
Submission: On March 31 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://scrollunlock.wordpress.com/

<form role="search" method="get" class="search-form" action="https://scrollunlock.wordpress.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST https://subscribe.wordpress.com

<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
  <div>
    <input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
  </div>
  <input type="hidden" name="action" value="subscribe">
  <input type="hidden" name="blog_id" value="120550501">
  <input type="hidden" name="source" value="https://scrollunlock.wordpress.com/">
  <input type="hidden" name="sub-type" value="actionbar-follow">
  <input type="hidden" id="_wpnonce" name="_wpnonce" value="540add3eaf">
  <div class="actnbr-button-wrap">
    <button type="submit" value="Sign me up"> Sign me up </button>
  </div>
</form>

Text Content

SCROLLUNLOCK


"STAY AHEAD OF THE GAME WITH EVERY SCROLL IN OFFENSIVE SECURITY."


MENU

Skip to content
 * Home
   * Hello World!!
 * Dev Corner
   * Git / GitHub
   * Django ~ debugging
   * PowerShell
 * Linux / Unix Corner
 * Offensive Security
   * SQL INJECTION
 * About
 * Blog
 * My YouTube Channel
 * Grid of Posts 4×2


HELLO WORLD!!


SQL INJECTION | XSS | CSRF | JWT| CORS | XXE | SSRF | CLICKJACKING | DOM-BASED
VULNERABILITY | HTTP REQUEST SMUGGLING | OS COMMAND INJECTION | SERVICE SIDE
TEMPLATE INJECTION | DIRECTORY TRAVERSAL | ACCESS CONTROL VULNERABILITY |
AUTHENTICATION | WEB SOCKETS | WEB CACHE POISONING | INSECURE DESERIALISATION |
INFORMATION DISCLOSURE | BUSINESS LOGIN VULNERABILITY | HTTP HOST HEADER ATTACK
| OAUTH AUTHENTICATION | FILE UPLOAD VULNERABILITY | ESSENTIAL SKILLS |
PROTOTYPE POLLUTION.


Advertisements
Powered by wordads.co
We've received your report.

Thanks for your feedback!
Seen too often
Not relevant
Offensive
Broken
Report this adPrivacy


SHARE THIS:

 * Click to share on LinkedIn (Opens in new window)
 * Click to share on Twitter (Opens in new window)
 * Click to share on Facebook (Opens in new window)
 * Click to share on Tumblr (Opens in new window)
 * Click to share on Pinterest (Opens in new window)
 * Click to share on Pocket (Opens in new window)
 * Click to share on Telegram (Opens in new window)
 * Click to share on WhatsApp (Opens in new window)
 * Click to share on Reddit (Opens in new window)
 * Click to email a link to a friend (Opens in new window)
 * 

Like Loading...
Search for:
Create a website or blog at WordPress.com

 * Subscribe Subscribed
    * ScrollUnlock
      
      Sign me up
    * Already have a WordPress.com account? Log in now.

 * Privacy
 *  * ScrollUnlock
    * Customize
    * Subscribe Subscribed
    * Sign up
    * Log in
    * Copy shortlink
    * Report this content
    * View post in Reader
    * Manage subscriptions
    * Collapse this bar

%d