Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Disallow: |
Title | 0xsp | |
Description | About Home Posts Projects Contact Us Community Login/Register About 0xsp offensive Red ops techniques Hunting Windows Credentials (CredUIPromptForWindowsCredent |
Keywords | N/A |
WebSite | 0xsp.com |
Host IP | 217.69.9.103 |
Location | Greece |
Site | Rank |
US$2,485,843
Last updated: 2022-06-19 04:48:25
0xsp.com has Semrush global rank of 4,257,833. 0xsp.com has an estimated worth of US$ 2,485,843, based on its estimated Ads revenue. 0xsp.com receives approximately 286,829 unique visitors each day. Its web server is located in Greece, with IP address 217.69.9.103. According to SiteAdvisor, 0xsp.com is safe to visit. |
Purchase/Sale Value | US$2,485,843 |
Daily Ads Revenue | US$2,295 |
Monthly Ads Revenue | US$68,839 |
Yearly Ads Revenue | US$826,065 |
Daily Unique Visitors | 19,122 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
0xsp.com. | A | 300 | IP: 217.69.9.103 |
0xsp.com. | NS | 300 | NS Record: ns2nsw.name.com. |
0xsp.com. | NS | 300 | NS Record: ns3ghw.name.com. |
0xsp.com. | NS | 300 | NS Record: ns4qxz.name.com. |
0xsp.com. | NS | 300 | NS Record: ns1dhq.name.com. |
0xsp.com. | MX | 300 | MX Record: 10 mx.0xsp.com.cust.b.hostedemail.com. |
0xsp.com. | TXT | 300 | TXT Record: google-site-verification=siV1r3-Z6c2RHQWkIoOUtgX032T-W-3FEixcU0c_0i8 |
Home Posts Projects Contact Us Community Login/Register About 0xsp offensive Red ops techniques Hunting Windows Credentials (CredUIPromptForWindowsCredentials) unique attacks with 0xsp mongoose red bypass restricted command prompt for none-privileged users handy techniques to bypass environment restrictions DLL Self Contained in PowerShell Microsoft File CheckSum DLL hijacking Attack DirectX Software Development Kit(SDK) RCE Exploitation Gophish on Digital Ocean with Blacklist Range .NET Exploitation MITRE T1121 Reverse Shell with password protection Bypass Symantec Email Security.cloud red team cheatsheet bypass endpoint with XLM weaponization Red Team Ops - Mind Map Web attacks payloads collections Privilege Escalation cheatsheet offensive cheatsheet Active Directory (Attack & Defense ) Windows Blind Files Collection Red Teaming Toolkit Collection security dev 0xsp-mongoose RED 0xsp mongoose windows privilege escalation enumeration Exploits-DB Online web terminal tool Threat |
HTTP/1.1 200 OK Date: Fri, 22 Oct 2021 20:05:36 GMT Server: Apache/2.4.29 (Ubuntu) Cache-Control: no-cache, private Set-Cookie: XSRF-TOKEN=eyJpdiI6InhhNWF2SzJFd2NEUzlKMmlHT21ISEE9PSIsInZhbHVlIjoiYVNJSWpsR0w4U3J6UWtobFdoXC9vSUxGYUFYdVpIemNWRm1iVDg1R25VUytaZjFpN1JTcmpaRG1RcDc3QWNRS1VjVUFscGFWZGlUQjFLQlVJd1FOVFdMd3pZQjBKVERHcjdwUExSUUwwVlFCdExQT244R1A1eGtyVXdQbjdYUGdnIiwibWFjIjoiYTVmOGEyNjA2MDczMmRkYjM4MjYxY2NkMTllZTkyMjAzZTlhNzAyZmIxNGNhNzVkNzg4Y2U1MTE2MzI5ZmEwZCJ9; expires=Fri, 22-Oct-2021 22:05:36 GMT; Max-Age=7200; path=/ Set-Cookie: 0xsp_session=eyJpdiI6IklrRTdKSjdEWTB3bEIxUndEbEIzTnc9PSIsInZhbHVlIjoiYW5HUjdVZUtSOHhpbHh4MjJ1cmZKXC9XXC92Vkc1bVFxcFJoUmpIVFZCNEpBV1Z3Vkt4UFY0Wks3OWp4eTZ5KzFrU0ZBdE5ESXJLN0NneTlQV3VmXC92NXF6Z3VJNExqZmVqMVpHRzl2KytnN0ViZE1JeEwxZ1A2UGNNTERIM2VRM3giLCJtYWMiOiI2ZDJkZmZjOTljNGE0ZGQ5MjFiN2Q0YjYzZTNjODQ1MzMyZjEzNTMyYmI5NzgxMGEyYjc4YzJkYWQ1ODI0OGFhIn0%3D; expires=Fri, 22-Oct-2021 22:05:36 GMT; Max-Age=7200; path=/; httponly Content-Type: text/html; charset=UTF-8 |
Domain Name: 0XSP.COM Registry Domain ID: 2387627327_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.name.com Registrar URL: http://www.name.com Updated Date: 2021-04-28T10:16:38Z Creation Date: 2019-05-05T16:41:30Z Registry Expiry Date: 2022-05-05T16:41:30Z Registrar: Name.com, Inc. Registrar IANA ID: 625 Registrar Abuse Contact Email: abuse@name.com Registrar Abuse Contact Phone: 7202492374 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: NS1DHQ.NAME.COM Name Server: NS2NSW.NAME.COM Name Server: NS3GHW.NAME.COM Name Server: NS4QXZ.NAME.COM DNSSEC: unsigned >>> Last update of whois database: 2021-09-11T09:57:01Z <<< |