Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
Sitemap: |
Title | hyprblog | Vulnerability research, software development, and other |
Description | received signal SIGSEGV Vulnerability research, software development, and other |
Keywords | N/A |
WebSite | surfingthecyber.com |
Host IP | 216.239.36.21 |
Location | United States |
Site | Rank |
US$1,005
Last updated: 2023-05-16 13:17:24
surfingthecyber.com has Semrush global rank of 0. surfingthecyber.com has an estimated worth of US$ 1,005, based on its estimated Ads revenue. surfingthecyber.com receives approximately 116 unique visitors each day. Its web server is located in United States, with IP address 216.239.36.21. According to SiteAdvisor, surfingthecyber.com is safe to visit. |
Purchase/Sale Value | US$1,005 |
Daily Ads Revenue | US$0 |
Monthly Ads Revenue | US$27 |
Yearly Ads Revenue | US$334 |
Daily Unique Visitors | 7 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
surfingthecyber.com. | A | 3600 | IP: 216.239.36.21 |
surfingthecyber.com. | A | 3600 | IP: 216.239.38.21 |
surfingthecyber.com. | A | 3600 | IP: 216.239.32.21 |
surfingthecyber.com. | A | 3600 | IP: 216.239.34.21 |
surfingthecyber.com. | AAAA | 3600 | IPV6: 2001:4860:4802:32::15 |
surfingthecyber.com. | AAAA | 3600 | IPV6: 2001:4860:4802:38::15 |
surfingthecyber.com. | AAAA | 3600 | IPV6: 2001:4860:4802:34::15 |
surfingthecyber.com. | AAAA | 3600 | IPV6: 2001:4860:4802:36::15 |
surfingthecyber.com. | NS | 21600 | NS Record: ns-cloud-c1.googledomains.com. |
surfingthecyber.com. | NS | 21600 | NS Record: ns-cloud-c4.googledomains.com. |
surfingthecyber.com. | NS | 21600 | NS Record: ns-cloud-c2.googledomains.com. |
surfingthecyber.com. | NS | 21600 | NS Record: ns-cloud-c3.googledomains.com. |
hyprblog GPG GitHub Mastodon --> received signal SIGSEGV (lmao) Posts --> May 12, 2023 rax30 patch diff analysis & nday exploit for zdi-23-496 Having recently spent some time working on an exploit for an 0day I’d found on the RAX30, the recent release of a few ZDI advisories for this device caught my attention. I took a quick look to confirm there weren’t any collisions with my bug, and after confirming this wasn’t the case (phew!), I decided to use this as an opportunity to do some patch diff analysis and see if there were any bugs worth writing exploits for. Aug 4, 2022 nday exploit: libinput format string bug, canary leak exploit (cve-2022-1215) At the end of last year I stumbled on a crash in Xorg while playing with the GreatFET One but never really got around to follow up on it. Then a few weeks ago, I decided to finally root cause the issue and while in the middle of doing so I discovered that the issue had been reported and fixed only 3 months ago. Since I’d already |
HTTP/1.1 200 OK Date: Thu, 27 Jan 2022 11:16:17 GMT Expires: Thu, 27 Jan 2022 11:26:17 GMT Cache-Control: public, max-age=600 ETag: "9hBVPQ" X-Cloud-Trace-Context: 92a2e82c17fe2f07afdb2a800a6fcd82 Content-Type: text/html Server: Google Frontend Content-Length: 12288 |
Domain Name: SURFINGTHECYBER.COM Registry Domain ID: 2260742681_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.google.com Registrar URL: http://domains.google.com Updated Date: 2021-05-07T03:12:03Z Creation Date: 2018-05-06T19:23:42Z Registry Expiry Date: 2022-05-06T19:23:42Z Registrar: Google LLC Registrar IANA ID: 895 Registrar Abuse Contact Email: registrar-abuse@google.com Registrar Abuse Contact Phone: +1.8772376466 Domain Status: ok https://icann.org/epp#ok Name Server: NS-CLOUD-C1.GOOGLEDOMAINS.COM Name Server: NS-CLOUD-C2.GOOGLEDOMAINS.COM Name Server: NS-CLOUD-C3.GOOGLEDOMAINS.COM Name Server: NS-CLOUD-C4.GOOGLEDOMAINS.COM DNSSEC: unsigned >>> Last update of whois database: 2022-01-27T07:50:06Z <<< |