Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * Disallow: /norobots/ Sitemap: https://oxasploits.com/sitemap.xml |
Title | oxasploits.com | |
Description | A quick walkthrough of how to crack hashed passwords with John the A collection of blog enteries on infosec utilities and exploit development work by Marshall |
Keywords | N/A |
WebSite | oxagast.org |
Host IP | 68.183.103.32 |
Location | United States |
Site | Rank |
US$1,737
Last updated: 2022-06-15 08:58:04
oxagast.org has Semrush global rank of 0. oxagast.org has an estimated worth of US$ 1,737, based on its estimated Ads revenue. oxagast.org receives approximately 200 unique visitors each day. Its web server is located in United States, with IP address 68.183.103.32. According to SiteAdvisor, oxagast.org is safe to visit. |
Purchase/Sale Value | US$1,737 |
Daily Ads Revenue | US$1 |
Monthly Ads Revenue | US$48 |
Yearly Ads Revenue | US$577 |
Daily Unique Visitors | 13 |
Note: All traffic and earnings values are estimates. |
Host | Type | TTL | Data |
oxagast.org. | A | 1800 | IP: 68.183.103.32 |
oxagast.org. | NS | 3600 | NS Record: ns45.domaincontrol.com. |
oxagast.org. | NS | 3600 | NS Record: ns46.domaincontrol.com. |
oxasploits.com | oxasploits A collection of exploit dev and software whitepapers by Marshall Whittaker / oxagast HOME SERVICES CATEGORIES ARCHIVES TAGS ABOUT Home oxasploits.com | oxasploits Cancel A quick walkthrough of how to crack hashed passwords with John the Ripper So you’ve aquired a shadow file So… you have finally rooted the server and aquired the coveted /etc/shadow file. You want to reassure your access later on. What do you do now? If installing a... Apr 4 3 min passwords Password cracking wordlists reprise Intro These wordlists are some of my favorite to use for password cracking. Generally the larger the wordlist the longer it will take to crack a password, but the higher probabilty it will be i... Mar 26 1 min passwords Site wide release of my semi-private exploit archive What is in this dump? All of these exploits are originally coded by oxagast / Marshall Whittaker. Some of them were already known vulnerabilities that I took and re-evaluated then wrote an expl... Mar |
HTTP/1.1 301 Moved Permanently Date: Thu, 21 Oct 2021 09:07:13 GMT Server: Apache/2.4.41 (Ubuntu) Location: https://oxagast.org/ Content-Type: text/html; charset=iso-8859-1 HTTP/1.1 200 OK Date: Thu, 21 Oct 2021 09:07:13 GMT Server: Apache/2.4.41 (Ubuntu) Last-Modified: Sun, 26 Sep 2021 15:59:21 GMT ETag: "15fd-5cce8104fd63e" Accept-Ranges: bytes Content-Length: 5629 Vary: Accept-Encoding Content-Type: text/html |
Domain Name: OXAGAST.ORG Registry Domain ID: D402200000014497406-LROR Registrar WHOIS Server: whois.godaddy Registrar URL: http://www.whois.godaddy.com Updated Date: 2020-10-27T03:47:41Z Creation Date: 2020-08-27T15:26:07Z Registry Expiry Date: 2022-08-27T15:26:07Z Registrar: GoDaddy.com, LLC Registrar IANA ID: 146 Registrar Abuse Contact Email: abuse@godaddy.com Registrar Abuse Contact Phone: +1.4806242505 Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited Registrant State/Province: North Carolina Registrant Country: US Name Server: NS45.DOMAINCONTROL.COM Name Server: NS46.DOMAINCONTROL.COM DNSSEC: unsigned URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/) >>> Last update of WHOIS database: 2021-09-10T02:08:09Z <<< |