scrollunlock.wordpress.com
Open in
urlscan Pro
192.0.78.12
Public Scan
Submitted URL: http://scrollunlock.wordpress.com/
Effective URL: https://scrollunlock.wordpress.com/
Submission: On October 19 via api from US — Scanned from DE
Effective URL: https://scrollunlock.wordpress.com/
Submission: On October 19 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://scrollunlock.wordpress.com/
<form role="search" method="get" class="search-form" action="https://scrollunlock.wordpress.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
POST https://subscribe.wordpress.com
<form method="post" action="https://subscribe.wordpress.com" accept-charset="utf-8" style="display: none;">
<div>
<input type="email" name="email" placeholder="Enter your email address" class="actnbr-email-field" aria-label="Enter your email address">
</div>
<input type="hidden" name="action" value="subscribe">
<input type="hidden" name="blog_id" value="120550501">
<input type="hidden" name="source" value="https://scrollunlock.wordpress.com/">
<input type="hidden" name="sub-type" value="actionbar-follow">
<input type="hidden" id="_wpnonce" name="_wpnonce" value="767c7b820d">
<div class="actnbr-button-wrap">
<button type="submit" value="Sign me up"> Sign me up </button>
</div>
</form>
Text Content
SCROLLUNLOCK "STAY AHEAD OF THE GAME WITH EVERY SCROLL IN OFFENSIVE SECURITY." MENU Skip to content * Home * Hello World!! * Dev Corner * Git / GitHub * Django ~ debugging * PowerShell * Linux / Unix Corner * Offensive Security * SQL INJECTION * About * Contact * Blog HELLO WORLD!! SQL INJECTION | XSS | CSRF | JWT| CORS | XXE | SSRF | CLICKJACKING | DOM-BASED VULNERABILITY | HTTP REQUEST SMUGGLING | OS COMMAND INJECTION | SERVICE SIDE TEMPLATE INJECTION | DIRECTORY TRAVERSAL | ACCESS CONTROL VULNERABILITY | AUTHENTICATION | WEB SOCKETS | WEB CACHE POISONING | INSECURE DESERIALISATION | INFORMATION DISCLOSURE | BUSINESS LOGIN VULNERABILITY | HTTP HOST HEADER ATTACK | OAUTH AUTHENTICATION | FILE UPLOAD VULNERABILITY | ESSENTIAL SKILLS | PROTOTYPE POLLUTION. SHARE THIS: * Click to share on LinkedIn (Opens in new window) * Click to share on Twitter (Opens in new window) * Click to share on Facebook (Opens in new window) * Click to share on Tumblr (Opens in new window) * Click to share on Pinterest (Opens in new window) * Click to share on Pocket (Opens in new window) * Click to share on Telegram (Opens in new window) * Click to share on WhatsApp (Opens in new window) * Click to share on Reddit (Opens in new window) * Click to email a link to a friend (Opens in new window) * LIKE THIS: Like Loading... Search for: Create a website or blog at WordPress.com * Follow Following * ScrollUnlock Sign me up * Already have a WordPress.com account? Log in now. * * ScrollUnlock * Customize * Follow Following * Sign up * Log in * Copy shortlink * Report this content * View post in Reader * Manage subscriptions * Collapse this bar %d bloggers like this: