Security Research by Dan Rosenberg
Security research by Dan Rosenberg. security,hacking,linux,kernel,exploit,exploitation,fuzzing,reversing,application security,consulting,VSR,penetration testing,code review,code auditing,busticati.
Security research by Dan Rosenberg. security,hacking,linux,kernel,exploit,exploitation,fuzzing,reversing,application security,consulting,VSR,penetration testing,code review,code auditing,busticati.
Perfect, your title contains between 10 and 70 characters.
Great, your meta description contains between 70 and 160 characters.
We found 0 images on this web page. Good, most or all of your images have alt attributes
Ideal! This page's ratio of text to HTML code is between 25 and 70 percent.
Perfect, no Flash content has been detected on this page.
Great, there are no Iframes detected on this page.
Internal Links 83.33%
External Links [DoFollow 16.67%]
External Links [NoFollow 0%]
Anchor | Link | Type | Relationships |
---|---|---|---|
Blog | http://vulnfactory.org/blog | Internal | DoFollow |
Vulnerabilities | http://vulnfactory.org/vulns | Internal | DoFollow |
Exploits | http://vulnfactory.org/exploits | Internal | DoFollow |
Research | http://vulnfactory.org/research | Internal | DoFollow |
Contact | http://vulnfactory.org/contact | Internal | DoFollow |
Azimuth Security | http://azimuthsecurity.com | External | DoFollow |
15 Length
Perfect. Your declared charset is ISO-8859-1.
Good. Your declared language is EN.
Great! We haven't found deprecated HTML tags in your HTML.
Very bad. We have not found shortcut icon. Icons are one of easy ways to attract regular visitors to your website more often.
Great no email address has been found in plain text!
This page does not take advantage of Dublin Core.
We could not find a Print-Friendly CSS.
it's bugs all the way down, security research by dan rosenberg, kernel, researcher, bugs, home, engineering, all, research, security, linux, primarily, auditing, enjoy, vulnerabilities, fuzz, testing, finding, working, welcome, corner, exploits, open, little, dan, focused, down, source, especially, via, software, exploiting, internet, rosenberg, reverse, azimuth, blog, vulnfactory.org.