1
1
<!DOCTYPE html>
2
2
< html class ="no-js " lang ="en ">
3
- < head > < script src =" /livereload.js?mindelay=10&v=2&port=1313&path=livereload " data-no-instant defer > </ script >
3
+ < head >
4
4
< meta charset ="UTF-8 ">
5
5
< meta name ="viewport " content ="width=device-width, initial-scale=1 ">
6
- < title > 404 Page not found - </ title >
6
+ < title > 404 Page not found - PwnFuzz - Security Research & Exploit Development </ title >
7
7
< script > ( function ( d , e ) { d [ e ] = d [ e ] . replace ( "no-js" , "js" ) ; } ) ( document . documentElement , "className" ) ; </ script >
8
8
< meta name ="description " content ="">
9
- < meta property ="og:url " content ="http://localhost:1313/404.html ">
9
+
10
+
11
+
12
+ < meta name ="robots " content ="index, follow ">
13
+ < meta name ="author " content ="map[avatar:/img/profile-placeholder.jpg bio:Vulnerability Researcher, Exploit Developer name:D4mianWayne] ">
14
+ < meta name ="keywords " content ="pwnfuzz, security research, exploit development, vulnerability analysis, binary exploitation, fuzzing, red team, penetration testing, CVE analysis, offensive security ">
15
+
16
+
17
+ < link rel ="canonical " href ="https://pwnfuzz.com/404.html ">
18
+
19
+
20
+
21
+ < meta property ="og:site_name " content ="PwnFuzz - Security Research & Exploit Development ">
22
+ < meta property ="og:title " content ="404 Page not found - PwnFuzz - Security Research & Exploit Development ">
23
+ < meta property ="og:description " content ="">
24
+ < meta property ="og:url " content ="https://pwnfuzz.com/404.html ">
25
+ < meta property ="og:type " content ="article ">
26
+ < meta property ="og:locale " content ="en ">
27
+
28
+
29
+
30
+
31
+
32
+
33
+ < meta property ="article:published_time " content ="0001-01-01T00:00:00Z ">
34
+
35
+
36
+
37
+
38
+
39
+
40
+
41
+ < meta name ="twitter:card " content ="summary_large_image ">
42
+ < meta name ="twitter:site " content ="@D4mianWayne ">
43
+ < meta name ="twitter:creator " content ="@D4mianWayne ">
44
+ < meta name ="twitter:title " content ="404 Page not found ">
45
+ < meta name ="twitter:description " content ="">
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+ < script type ="application/ld+json ">
55
+ {
56
+ "@context" : "https://schema.org" ,
57
+ "@type" : "Article" ,
58
+ "headline" : "404 Page not found" ,
59
+ "description" : "" ,
60
+ "image" : "https://pwnfuzz.com/img/pwnfuzz.png" ,
61
+ "author" : {
62
+ "@type" : "Person" ,
63
+ "name" : "D4mianWayne"
64
+ } ,
65
+ "publisher" : {
66
+ "@type" : "Organization" ,
67
+ "name" : "PwnFuzz" ,
68
+ "logo" : {
69
+ "@type" : "ImageObject" ,
70
+ "url" : "https://pwnfuzz.com/img/pwnfuzz.png"
71
+ }
72
+ } ,
73
+ "datePublished" : "0001-01-01T00:00:00Z" ,
74
+ "dateModified" : "0001-01-01T00:00:00Z" ,
75
+ "mainEntityOfPage" : {
76
+ "@type" : "WebPage" ,
77
+ "@id" : "https:\/\/pwnfuzz.com\/404.html"
78
+ }
79
+ }
80
+ </ script >
81
+
82
+
83
+
84
+ < meta http-equiv ="X-Content-Type-Options " content ="nosniff ">
85
+ < meta http-equiv ="X-Frame-Options " content ="DENY ">
86
+ < meta http-equiv ="X-XSS-Protection " content ="1; mode=block ">
87
+ < meta name ="referrer " content ="strict-origin-when-cross-origin ">
88
+
89
+
90
+
91
+
92
+
93
+
94
+
95
+
96
+
97
+
98
+
99
+
100
+
101
+
102
+
103
+ < script type ="application/ld+json ">
104
+ {
105
+ "@context" : "https://schema.org" ,
106
+ "@type" : "WebSite" ,
107
+ "name" : "PwnFuzz" ,
108
+ "url" : "https://pwnfuzz.com" ,
109
+ "potentialAction" : {
110
+ "@type" : "SearchAction" ,
111
+ "target" : "https://pwnfuzz.com/search?q={search_term_string}" ,
112
+ "query-input" : "required name=search_term_string"
113
+ }
114
+ }
115
+ </ script >
116
+ < meta property ="og:url " content ="https://pwnfuzz.com/404.html ">
117
+ < meta property ="og:site_name " content ="PwnFuzz - Security Research & Exploit Development ">
10
118
< meta property ="og:title " content ="404 Page not found ">
11
- < meta property ="og:description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
119
+ < meta property ="og:description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
12
120
< meta property ="og:locale " content ="en_us ">
13
121
< meta property ="og:type " content ="website ">
14
122
15
123
16
124
< meta itemprop ="name " content ="404 Page not found ">
17
- < meta itemprop ="description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
125
+ < meta itemprop ="description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
18
126
19
127
< meta name ="twitter:card " content ="summary ">
20
128
< meta name ="twitter:title " content ="404 Page not found ">
21
- < meta name ="twitter:description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
129
+ < meta name ="twitter:description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
22
130
23
131
< link rel ="preconnect " href ="https://fonts.gstatic.com " crossorigin >
24
132
< link rel ="dns-prefetch " href ="//fonts.googleapis.com ">
30
138
31
139
< link rel ="shortcut icon " href ="/favicon.ico ">
32
140
141
+
142
+ < script async src ="https://www.googletagmanager.com/gtag/js?id=G-R5CC5776NV "> </ script >
143
+ < script >
144
+ var doNotTrack = false ;
145
+ if ( false ) {
146
+ var dnt = ( navigator . doNotTrack || window . doNotTrack || navigator . msDoNotTrack ) ;
147
+ var doNotTrack = ( dnt == "1" || dnt == "yes" ) ;
148
+ }
149
+ if ( ! doNotTrack ) {
150
+ window . dataLayer = window . dataLayer || [ ] ;
151
+ function gtag ( ) { dataLayer . push ( arguments ) ; }
152
+ gtag ( 'js' , new Date ( ) ) ;
153
+ gtag ( 'config' , 'G-R5CC5776NV' ) ;
154
+ }
155
+ </ script >
33
156
</ head >
34
157
< body class ="body ">
35
158
< div class ="container container--outer ">
@@ -102,7 +225,7 @@ <h1 class="warning__headline">404. Page not found</h1>
102
225
< form class ="widget-search__form " role ="search " method ="get " action ="https://google.com/search ">
103
226
< input class ="widget-search__field " type ="search " placeholder ="Search… " value ="" name ="q " aria-label ="Search… ">
104
227
< input class ="widget-search__submit " type ="submit " value ="Search ">
105
- < input type ="hidden " name ="sitesearch " value ="http ://localhost:1313 / ">
228
+ < input type ="hidden " name ="sitesearch " value ="https ://pwnfuzz.com / ">
106
229
</ form >
107
230
</ div >
108
231
< div class ="widget-recent widget ">
@@ -136,16 +259,19 @@ <h4 class="widget__title">Tags</h4>
136
259
< a class ="widget-taglist__link widget__link btn " href ="/tags/.net/ " title =".NET "> .NET (1)</ a >
137
260
< a class ="widget-taglist__link widget__link btn " href ="/tags/1day/ " title ="1day "> 1day (1)</ a >
138
261
< a class ="widget-taglist__link widget__link btn " href ="/tags/auth-bypass/ " title ="Auth-Bypass "> Auth-Bypass (1)</ a >
262
+ < a class ="widget-taglist__link widget__link btn " href ="/tags/crushftp/ " title ="CrushFTP "> CrushFTP (1)</ a >
139
263
< a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-37297/ " title ="CVE-2024-37297 "> CVE-2024-37297 (1)</ a >
140
264
< a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-4040/ " title ="Cve-2024-4040 "> Cve-2024-4040 (1)</ a >
141
265
< a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-53675/ " title ="CVE-2024-53675 "> CVE-2024-53675 (1)</ a >
142
266
< a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-53676/ " title ="CVE-2024-53676 "> CVE-2024-53676 (1)</ a >
143
267
< a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2025-2825/ " title ="CVE-2025-2825 "> CVE-2025-2825 (1)</ a >
144
268
< a class ="widget-taglist__link widget__link btn " href ="/tags/example/ " title ="Example "> Example (1)</ a >
269
+ < a class ="widget-taglist__link widget__link btn " href ="/tags/exploit-development/ " title ="Exploit-Development "> Exploit-Development (1)</ a >
145
270
< a class ="widget-taglist__link widget__link btn " href ="/tags/logic-flaw/ " title ="Logic-Flaw "> Logic-Flaw (1)</ a >
146
271
< a class ="widget-taglist__link widget__link btn " href ="/tags/oob-xxe/ " title ="OOB-XXE "> OOB-XXE (1)</ a >
147
272
< a class ="widget-taglist__link widget__link btn " href ="/tags/path-traversal/ " title ="Path Traversal "> Path Traversal (1)</ a >
148
273
< a class ="widget-taglist__link widget__link btn " href ="/tags/ssti/ " title ="SSTI "> SSTI (1)</ a >
274
+ < a class ="widget-taglist__link widget__link btn " href ="/tags/vulnerability-research/ " title ="Vulnerability-Research "> Vulnerability-Research (1)</ a >
149
275
</ div >
150
276
</ div >
151
277
@@ -155,7 +281,7 @@ <h4 class="widget__title">Tags</h4>
155
281
< div class ="container footer__container flex ">
156
282
157
283
< div class ="footer__copyright ">
158
- © 2025 .
284
+ © 2025 PwnFuzz - Security Research & Exploit Development .
159
285
< span class ="footer__copyright-credits "> Generated with < a href ="https://gohugo.io/ " rel ="nofollow noopener " target ="_blank "> Hugo</ a > and < a href ="https://github.com/Vimux/Mainroad/ " rel ="nofollow noopener " target ="_blank "> Mainroad</ a > theme.</ span >
160
286
</ div >
161
287
</ div >
0 commit comments