Total words: 5613 | 2-word phrases: 1495 | 3-word phrases: 1655 | 4-word phrases: 1699
Title | Try to keep the title under 60 characters (93 characters) Soroush Dalili (@irsdl) Blog | A web application security ninja 🥷, a semicolon enthusiast! |
Description | Try to keep the meta description between 50 - 160 characters (0 characters) |
Keywords | Meta keywords are not recommended anymore (0 characters) |
H1 | H1 tag on the page (28 characters) Soroush Dalili (@irsdl) Blog |
# | Keyword | H1 | Title | Des | Volume | Position | Suggest | Frequency | Density |
---|---|---|---|---|---|---|---|---|---|
1 | the | 60 | 7.85% | ||||||
2 | to | 41 | 5.37% | ||||||
3 | in | 37 | 4.84% | ||||||
4 | a | 33 | 4.32% | ||||||
5 | 31 | 4.06% | |||||||
6 | and | 21 | 2.75% | ||||||
7 | data | 20 | 2.62% | ||||||
8 | of | 19 | 2.49% | ||||||
9 | 2024 | 18 | 2.36% | ||||||
10 | injection | 15 | 1.96% |
# | URL | Whois | Check |
---|---|---|---|
1 | https://www.secproject.com/ | Whois | secproject.com |
2 | https://portswigger.net/web-security/nosql-injection | Whois | portswigger.net |
3 | https://github.com/irsdl/vulnerable-node-app/ | Whois | github.com |
4 | https://twitter.com/CharlieBelmer | Whois | twitter.com |
5 | https://github.com/irsdl/vulnerable-node-app/blob/master/app/routes/product.route.js#L206 | Whois | github.com |
6 | https://www.mongodb.com/docs/manual/reference/method/ | Whois | mongodb.com |
7 | https://twitter.com/irsdl | Whois | twitter.com |
8 | https://github.com/irsdl | Whois | github.com |
9 | https://www.linkedin.com/in/sdalili/ | Whois | linkedin.com |
10 | https://www.reddit.com/r/websecurityresearch/.rss | Whois | reddit.com |
11 | https://www.reddit.com/r/websecurityresearch/ | Whois | reddit.com |
12 | https://www.reddit.com/r/websecurityresearch/comments/1en779m/listen_to_the_whispers_web_timing_attacks_that/ | Whois | reddit.com |
13 | https://www.reddit.com/r/websecurityresearch/comments/1ea0qr8/how_to_create_a_burp_suite_extension_from_scratch/ | Whois | reddit.com |
14 | https://www.reddit.com/r/websecurityresearch/comments/1e6a8nu/a_commonly_overlooked_xss_vector/ | Whois | reddit.com |
15 | https://www.reddit.com/r/websecurityresearch/comments/1e65pju/unveiling_te0_http_request_smuggling_discovering/ | Whois | reddit.com |
16 | https://www.reddit.com/r/websecurityresearch/comments/1e3x972/encoding_differentials_why_charset_matters/ | Whois | reddit.com |
17 | https://www.reddit.com/r/websecurityresearch/comments/1e1ec5w/a_race_to_the_bottom_database_transactions/ | Whois | reddit.com |
18 | https://www.reddit.com/r/websecurityresearch/comments/1dzsaol/timebased_orm_leak_attacks/ | Whois | reddit.com |
19 | https://www.reddit.com/r/websecurityresearch/comments/1dxivgh/universal_code_execution_by_chaining_messages_in/ | Whois | reddit.com |
20 | https://www.reddit.com/r/websecurityresearch/comments/1du8oxa/exploiting_clientside_path_traversal_to_perform/ | Whois | reddit.com |
21 | https://www.reddit.com/r/websecurityresearch/comments/1do513h/orm_leak_vulnerabilities/ | Whois | reddit.com |
22 | http://www.reddit.com/r/netsec/.rss | Whois | reddit.com |
23 | https://www.reddit.com/r/netsec/ | Whois | reddit.com |
24 | https://www.reddit.com/r/netsec/comments/1euis5q/exploiting_huggingfaces_assistants_to_extract/ | Whois | reddit.com |
25 | https://www.reddit.com/r/netsec/comments/1etvmxf/cve202441660_a_critical_vulnerability_in_openbmc/ | Whois | reddit.com |
26 | https://www.reddit.com/r/netsec/comments/1etqy18/mifare_classic_exposing_the_static_encrypted/ | Whois | reddit.com |
27 | https://www.reddit.com/r/netsec/comments/1etkh9r/creating_a_malicious_atlassian_plugin_atlassian/ | Whois | reddit.com |
28 | https://www.reddit.com/r/netsec/comments/1et0e1x/msi_motherboards_susceptible_to_code_execution/ | Whois | reddit.com |
29 | https://www.exploit-db.com/rss.xml | Whois | exploit-db.com |
30 | https://www.exploit-db.com/ | Whois | exploit-db.com |
31 | https://www.exploit-db.com/exploits/52062 | Whois | exploit-db.com |
32 | https://www.exploit-db.com/exploits/52065 | Whois | exploit-db.com |
33 | https://www.exploit-db.com/exploits/52063 | Whois | exploit-db.com |
34 | https://www.exploit-db.com/exploits/52064 | Whois | exploit-db.com |
35 | https://www.exploit-db.com/exploits/52066 | Whois | exploit-db.com |