SOROUSH.ME KEYWORD DENSITY CHECKER

Total words: 5613 | 2-word phrases: 1495 | 3-word phrases: 1655 | 4-word phrases: 1699

PAGE INFO

Title Try to keep the title under 60 characters (93 characters)
Soroush Dalili (@irsdl) Blog | A web application security ninja 🥷, a semicolon enthusiast!
Description Try to keep the meta description between 50 - 160 characters (0 characters)
Keywords Meta keywords are not recommended anymore (0 characters)
H1 H1 tag on the page (28 characters)
Soroush Dalili (@irsdl) Blog

ONE WORD PHRASES 764 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1the607.85%
2to415.37%
3in374.84%
4a334.32%
5  314.06%
6and212.75%
7data202.62%
8of192.49%
92024182.36%
10injection151.96%

TWO WORD PHRASES 1495 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1     281.87%
2       130.87%
3sql injection120.80%
4nosql injection100.67%
5in a100.67%
6to the70.47%
72024 ualbinowax70.47%
8       70.47%
9http request60.40%
10injection attack60.40%
11post productlookupagg http11 host vulnerablelab400050.33%
12could be50.33%
13in the50.33%
14is a50.33%
15following http50.33%
16the following50.33%
17in mongodb50.33%
18used to40.27%
19how to40.27%
203 202440.27%

THREE WORD PHRASES 1655 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1nosql injection attack50.30%
2following http request50.30%
3          50.30%
4          merge 30.18%
5unquoted service path30.18%
6the “id” field30.18%
7the following http30.18%
8nosql injection attacks30.18%
9http request shows30.18%
10mongodb nosql injection30.18%
11access other collections20.12%
12injection attacks i20.12%
13traditional sql database20.12%
14critical vulnerability in20.12%
15from other collections20.12%
16the data the20.12%
17       limit 1   20.12%
18request shows how20.12%
19june 23 202420.12%
20iis short file20.12%
21short file name20.12%
22   response body20.12%
23the aggregate method20.12%
24nosql injection with20.12%
25would be interesting20.12%
26        this20.12%
27to the database20.12%
28the users collection20.12%
291unquoted service path20.12%
30       merge        into users20.12%

FOUR WORD PHRASES 1699 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1the following http request30.18%
2               merge 30.18%
3following http request shows30.18%
4          merge        into users20.12%
5nosql injection attacks i20.12%
6mongodb nosql injection with20.12%
7http request shows how20.12%
8unquoted service path local20.12%
9iis short file name20.12%
10“updatemany” or “updateone” nosqli10.06%
11certain cases there are10.06%
12mongodb methods that could10.06%
13other mongodb methods that10.06%
14many other mongodb methods10.06%
15would be interesting to10.06%
16are many other mongodb10.06%
17there are many other10.06%
18cases there are many10.06%
19may be useful in10.06%
20exposed by mistake and10.06%
21which may be useful10.06%
22javascript which may be10.06%
23run javascript which may10.06%
24can run javascript which10.06%
25operators can run javascript10.06%
26“accumulator” operators can run10.06%
27be interesting to see10.06%
28methods that could be10.06%
29by mistake and then10.06%
30on methods such as10.06%
31by nosql injection attacks10.06%
32research on methods such10.06%
33much research on methods10.06%
34seen much research on10.06%
35haven’t seen much research10.06%
36i haven’t seen much10.06%
37instance i haven’t seen10.06%
38nosql injection attacks for10.06%
39or “updateone” nosqli when10.06%
40mistake and then exploited10.06%

EXTERNAL LINKS

# URL Whois Check
1https://www.secproject.com/ Whoissecproject.com
2 https://portswigger.net/web-security/nosql-injection Whoisportswigger.net
3 https://github.com/irsdl/vulnerable-node-app/ Whoisgithub.com
4 https://twitter.com/CharlieBelmer Whoistwitter.com
5 https://github.com/irsdl/vulnerable-node-app/blob/master/app/routes/product.route.js#L206 Whoisgithub.com
6 https://www.mongodb.com/docs/manual/reference/method/ Whoismongodb.com
7 https://twitter.com/irsdl Whoistwitter.com
8 https://github.com/irsdl Whoisgithub.com
9 https://www.linkedin.com/in/sdalili/ Whoislinkedin.com
10 https://www.reddit.com/r/websecurityresearch/.rss Whoisreddit.com
11 https://www.reddit.com/r/websecurityresearch/ Whoisreddit.com
12 https://www.reddit.com/r/websecurityresearch/comments/1en779m/listen_to_the_whispers_web_timing_attacks_that/ Whoisreddit.com
13 https://www.reddit.com/r/websecurityresearch/comments/1ea0qr8/how_to_create_a_burp_suite_extension_from_scratch/ Whoisreddit.com
14 https://www.reddit.com/r/websecurityresearch/comments/1e6a8nu/a_commonly_overlooked_xss_vector/ Whoisreddit.com
15 https://www.reddit.com/r/websecurityresearch/comments/1e65pju/unveiling_te0_http_request_smuggling_discovering/ Whoisreddit.com
16 https://www.reddit.com/r/websecurityresearch/comments/1e3x972/encoding_differentials_why_charset_matters/ Whoisreddit.com
17 https://www.reddit.com/r/websecurityresearch/comments/1e1ec5w/a_race_to_the_bottom_database_transactions/ Whoisreddit.com
18 https://www.reddit.com/r/websecurityresearch/comments/1dzsaol/timebased_orm_leak_attacks/ Whoisreddit.com
19 https://www.reddit.com/r/websecurityresearch/comments/1dxivgh/universal_code_execution_by_chaining_messages_in/ Whoisreddit.com
20 https://www.reddit.com/r/websecurityresearch/comments/1du8oxa/exploiting_clientside_path_traversal_to_perform/ Whoisreddit.com
21 https://www.reddit.com/r/websecurityresearch/comments/1do513h/orm_leak_vulnerabilities/ Whoisreddit.com
22 http://www.reddit.com/r/netsec/.rss Whoisreddit.com
23 https://www.reddit.com/r/netsec/ Whoisreddit.com
24 https://www.reddit.com/r/netsec/comments/1euis5q/exploiting_huggingfaces_assistants_to_extract/ Whoisreddit.com
25 https://www.reddit.com/r/netsec/comments/1etvmxf/cve202441660_a_critical_vulnerability_in_openbmc/ Whoisreddit.com
26 https://www.reddit.com/r/netsec/comments/1etqy18/mifare_classic_exposing_the_static_encrypted/ Whoisreddit.com
27 https://www.reddit.com/r/netsec/comments/1etkh9r/creating_a_malicious_atlassian_plugin_atlassian/ Whoisreddit.com
28 https://www.reddit.com/r/netsec/comments/1et0e1x/msi_motherboards_susceptible_to_code_execution/ Whoisreddit.com
29 https://www.exploit-db.com/rss.xml Whoisexploit-db.com
30 https://www.exploit-db.com/ Whoisexploit-db.com
31 https://www.exploit-db.com/exploits/52062 Whoisexploit-db.com
32 https://www.exploit-db.com/exploits/52065 Whoisexploit-db.com
33 https://www.exploit-db.com/exploits/52063 Whoisexploit-db.com
34 https://www.exploit-db.com/exploits/52064 Whoisexploit-db.com
35 https://www.exploit-db.com/exploits/52066 Whoisexploit-db.com