Skip to content

Commit 3b164be

Browse files
committed
Update site content and SEO configurations. Added Google Analytics tracking to hugo.toml, enhanced SEO meta tags in custom-seo.html, and updated copyright information across multiple HTML files to reflect PwnFuzz branding. Improved sitemap and RSS feed links to point to the live site, ensuring better search engine indexing and user navigation.
1 parent 2646721 commit 3b164be

File tree

64 files changed

+4424
-887
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+4424
-887
lines changed

hugo.toml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@ description = "PwnFuzz is a leading security research blog focused on vulnerabil
88
keywords = ["pwnfuzz", "security research", "exploit development", "vulnerability analysis", "binary exploitation", "fuzzing", "red team", "penetration testing", "CVE analysis", "offensive security"]
99
author = "D4mianWayne"
1010

11+
# Google Analytics
12+
googleAnalytics = "G-R5CC5776NV"
13+
1114
# Enable sitemap generation
1215
[outputs]
1316
home = ["HTML", "RSS", "JSON"]

hugo_stats.json

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,16 +32,23 @@
3232
"path",
3333
"pre",
3434
"script",
35+
"section",
3536
"span",
3637
"strong",
38+
"style",
3739
"svg",
3840
"time",
3941
"title",
4042
"ul"
4143
],
4244
"classes": [
45+
"about-content",
46+
"about-preview",
4347
"body",
4448
"btn",
49+
"btn-outline",
50+
"btn-primary",
51+
"btn-secondary",
4552
"clearfix",
4653
"container",
4754
"container--outer",
@@ -52,13 +59,20 @@
5259
"fa-user",
5360
"far",
5461
"fas",
62+
"featured-posts",
5563
"flex",
5664
"footer",
5765
"footer__container",
5866
"footer__copyright",
5967
"footer__copyright-credits",
6068
"header",
6169
"header__container",
70+
"hero-content",
71+
"hero-cta",
72+
"hero-description",
73+
"hero-section",
74+
"hero-subtitle",
75+
"hero-title",
6276
"highlight",
6377
"icon",
6478
"icon-category",
@@ -109,20 +123,32 @@
109123
"pager__title",
110124
"post",
111125
"post-author",
126+
"post-card",
127+
"post-card-content",
128+
"post-card-excerpt",
129+
"post-card-meta",
130+
"post-card-title",
112131
"post-categories",
132+
"post-category",
113133
"post-date",
114134
"post-meta",
115135
"post-summary",
136+
"post-tags",
116137
"post__content",
117138
"post__footer",
118139
"post__header",
119140
"post__meta",
120141
"post__tags",
121142
"post__title",
122143
"post__toc",
144+
"posts-grid",
123145
"primary",
124146
"reading-time",
147+
"research-areas",
148+
"research-grid",
149+
"research-item",
125150
"sidebar",
151+
"tag",
126152
"tags",
127153
"tags__badge",
128154
"tags__item",
@@ -136,6 +162,7 @@
136162
"toc",
137163
"toc__menu",
138164
"toc__title",
165+
"view-all-posts",
139166
"warning",
140167
"warning__headline",
141168
"warning__text",
@@ -171,16 +198,20 @@
171198
"exploiting-the-xxe-vulnerability-proof-of-concept",
172199
"exploiting-xxe-in-hpe-insight-remote-support-cve-2024-53675",
173200
"exploiting-xxe-turning-theory-into-action",
201+
"get-involved",
174202
"inside-the-vulnerability-a-deep-dive",
175203
"leveraging-to-rce",
176204
"overcoming-obstacles-challenges-in-exploiting-xxe",
177205
"overview",
178206
"patch",
179207
"references",
208+
"research-focus-areas",
180209
"theoretical-exploitation-setup-issues-preventing-full-rce",
181210
"triggering-the-vulnerability-understanding-the-flaw",
182211
"uncovering-the-importxml-vulnerability",
183-
"understanding-the-rce-vulnerability-in-processatatchmentdatastream"
212+
"understanding-the-rce-vulnerability-in-processatatchmentdatastream",
213+
"what-is-pwnfuzz",
214+
"why-pwnfuzz"
184215
]
185216
}
186217
}

layouts/partials/head/custom-seo.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{{/* Enhanced SEO Meta Tags */}}
22
<meta name="robots" content="index, follow">
33
<meta name="author" content="{{ .Site.Params.author | default "D4mianWayne" }}">
4-
<meta name="keywords" content="{{ if .Params.keywords }}{{ delimit .Params.keywords ", " }}{{ else }}{{ delimit .Site.Params.keywords ", " }}{{ end }}">
4+
<meta name="keywords" content="{{ if .Params.keywords }}{{ delimit .Params.keywords ", " }}{{ else if .Site.Params.keywords }}{{ delimit .Site.Params.keywords ", " }}{{ else }}pwnfuzz, security research, exploit development, vulnerability analysis, binary exploitation, fuzzing, red team, penetration testing, CVE analysis, offensive security{{ end }}">
55

66
{{/* Canonical URL */}}
77
<link rel="canonical" href="{{ .Permalink }}">

public/404.html

Lines changed: 134 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,132 @@
11
<!DOCTYPE html>
22
<html class="no-js" lang="en">
3-
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
3+
<head>
44
<meta charset="UTF-8">
55
<meta name="viewport" content="width=device-width, initial-scale=1">
6-
<title>404 Page not found - </title>
6+
<title>404 Page not found - PwnFuzz - Security Research &amp; Exploit Development</title>
77
<script>(function(d,e){d[e]=d[e].replace("no-js","js");})(document.documentElement,"className");</script>
88
<meta name="description" content="">
9-
<meta property="og:url" content="http://localhost:1313/404.html">
9+
10+
11+
12+
<meta name="robots" content="index, follow">
13+
<meta name="author" content="map[avatar:/img/profile-placeholder.jpg bio:Vulnerability Researcher, Exploit Developer name:D4mianWayne]">
14+
<meta name="keywords" content="pwnfuzz, security research, exploit development, vulnerability analysis, binary exploitation, fuzzing, red team, penetration testing, CVE analysis, offensive security">
15+
16+
17+
<link rel="canonical" href="https://pwnfuzz.com/404.html">
18+
19+
20+
21+
<meta property="og:site_name" content="PwnFuzz - Security Research &amp; Exploit Development">
22+
<meta property="og:title" content="404 Page not found - PwnFuzz - Security Research &amp; Exploit Development">
23+
<meta property="og:description" content="">
24+
<meta property="og:url" content="https://pwnfuzz.com/404.html">
25+
<meta property="og:type" content="article">
26+
<meta property="og:locale" content="en">
27+
28+
29+
30+
31+
32+
33+
<meta property="article:published_time" content="0001-01-01T00:00:00Z">
34+
35+
36+
37+
38+
39+
40+
41+
<meta name="twitter:card" content="summary_large_image">
42+
<meta name="twitter:site" content="@D4mianWayne">
43+
<meta name="twitter:creator" content="@D4mianWayne">
44+
<meta name="twitter:title" content="404 Page not found">
45+
<meta name="twitter:description" content="">
46+
47+
48+
49+
50+
51+
52+
53+
54+
<script type="application/ld+json">
55+
{
56+
"@context": "https://schema.org",
57+
"@type": "Article",
58+
"headline": "404 Page not found",
59+
"description": "",
60+
"image": "https://pwnfuzz.com/img/pwnfuzz.png",
61+
"author": {
62+
"@type": "Person",
63+
"name": "D4mianWayne"
64+
},
65+
"publisher": {
66+
"@type": "Organization",
67+
"name": "PwnFuzz",
68+
"logo": {
69+
"@type": "ImageObject",
70+
"url": "https://pwnfuzz.com/img/pwnfuzz.png"
71+
}
72+
},
73+
"datePublished": "0001-01-01T00:00:00Z",
74+
"dateModified": "0001-01-01T00:00:00Z",
75+
"mainEntityOfPage": {
76+
"@type": "WebPage",
77+
"@id": "https:\/\/pwnfuzz.com\/404.html"
78+
}
79+
}
80+
</script>
81+
82+
83+
84+
<meta http-equiv="X-Content-Type-Options" content="nosniff">
85+
<meta http-equiv="X-Frame-Options" content="DENY">
86+
<meta http-equiv="X-XSS-Protection" content="1; mode=block">
87+
<meta name="referrer" content="strict-origin-when-cross-origin">
88+
89+
90+
91+
92+
93+
94+
95+
96+
97+
98+
99+
100+
101+
102+
103+
<script type="application/ld+json">
104+
{
105+
"@context": "https://schema.org",
106+
"@type": "WebSite",
107+
"name": "PwnFuzz",
108+
"url": "https://pwnfuzz.com",
109+
"potentialAction": {
110+
"@type": "SearchAction",
111+
"target": "https://pwnfuzz.com/search?q={search_term_string}",
112+
"query-input": "required name=search_term_string"
113+
}
114+
}
115+
</script>
116+
<meta property="og:url" content="https://pwnfuzz.com/404.html">
117+
<meta property="og:site_name" content="PwnFuzz - Security Research & Exploit Development">
10118
<meta property="og:title" content="404 Page not found">
11-
<meta property="og:description" content="Pwnfuzz - Exploring the world of fuzzing, binary exploitation, and exploit engineering!">
119+
<meta property="og:description" content="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis, binary exploitation, fuzzing techniques, and offensive security methodologies.">
12120
<meta property="og:locale" content="en_us">
13121
<meta property="og:type" content="website">
14122

15123

16124
<meta itemprop="name" content="404 Page not found">
17-
<meta itemprop="description" content="Pwnfuzz - Exploring the world of fuzzing, binary exploitation, and exploit engineering!">
125+
<meta itemprop="description" content="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis, binary exploitation, fuzzing techniques, and offensive security methodologies.">
18126

19127
<meta name="twitter:card" content="summary">
20128
<meta name="twitter:title" content="404 Page not found">
21-
<meta name="twitter:description" content="Pwnfuzz - Exploring the world of fuzzing, binary exploitation, and exploit engineering!">
129+
<meta name="twitter:description" content="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis, binary exploitation, fuzzing techniques, and offensive security methodologies.">
22130

23131
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
24132
<link rel="dns-prefetch" href="//fonts.googleapis.com">
@@ -30,6 +138,21 @@
30138

31139
<link rel="shortcut icon" href="/favicon.ico">
32140

141+
142+
<script async src="https://www.googletagmanager.com/gtag/js?id=G-R5CC5776NV"></script>
143+
<script>
144+
var doNotTrack = false;
145+
if ( false ) {
146+
var dnt = (navigator.doNotTrack || window.doNotTrack || navigator.msDoNotTrack);
147+
var doNotTrack = (dnt == "1" || dnt == "yes");
148+
}
149+
if (!doNotTrack) {
150+
window.dataLayer = window.dataLayer || [];
151+
function gtag(){dataLayer.push(arguments);}
152+
gtag('js', new Date());
153+
gtag('config', 'G-R5CC5776NV');
154+
}
155+
</script>
33156
</head>
34157
<body class="body">
35158
<div class="container container--outer">
@@ -102,7 +225,7 @@ <h1 class="warning__headline">404. Page not found</h1>
102225
<form class="widget-search__form" role="search" method="get" action="https://google.com/search">
103226
<input class="widget-search__field" type="search" placeholder="Search…" value="" name="q" aria-label="Search…">
104227
<input class="widget-search__submit" type="submit" value="Search">
105-
<input type="hidden" name="sitesearch" value="http://localhost:1313/">
228+
<input type="hidden" name="sitesearch" value="https://pwnfuzz.com/">
106229
</form>
107230
</div>
108231
<div class="widget-recent widget">
@@ -136,16 +259,19 @@ <h4 class="widget__title">Tags</h4>
136259
<a class="widget-taglist__link widget__link btn" href="/tags/.net/" title=".NET">.NET (1)</a>
137260
<a class="widget-taglist__link widget__link btn" href="/tags/1day/" title="1day">1day (1)</a>
138261
<a class="widget-taglist__link widget__link btn" href="/tags/auth-bypass/" title="Auth-Bypass">Auth-Bypass (1)</a>
262+
<a class="widget-taglist__link widget__link btn" href="/tags/crushftp/" title="CrushFTP">CrushFTP (1)</a>
139263
<a class="widget-taglist__link widget__link btn" href="/tags/cve-2024-37297/" title="CVE-2024-37297">CVE-2024-37297 (1)</a>
140264
<a class="widget-taglist__link widget__link btn" href="/tags/cve-2024-4040/" title="Cve-2024-4040">Cve-2024-4040 (1)</a>
141265
<a class="widget-taglist__link widget__link btn" href="/tags/cve-2024-53675/" title="CVE-2024-53675">CVE-2024-53675 (1)</a>
142266
<a class="widget-taglist__link widget__link btn" href="/tags/cve-2024-53676/" title="CVE-2024-53676">CVE-2024-53676 (1)</a>
143267
<a class="widget-taglist__link widget__link btn" href="/tags/cve-2025-2825/" title="CVE-2025-2825">CVE-2025-2825 (1)</a>
144268
<a class="widget-taglist__link widget__link btn" href="/tags/example/" title="Example">Example (1)</a>
269+
<a class="widget-taglist__link widget__link btn" href="/tags/exploit-development/" title="Exploit-Development">Exploit-Development (1)</a>
145270
<a class="widget-taglist__link widget__link btn" href="/tags/logic-flaw/" title="Logic-Flaw">Logic-Flaw (1)</a>
146271
<a class="widget-taglist__link widget__link btn" href="/tags/oob-xxe/" title="OOB-XXE">OOB-XXE (1)</a>
147272
<a class="widget-taglist__link widget__link btn" href="/tags/path-traversal/" title="Path Traversal">Path Traversal (1)</a>
148273
<a class="widget-taglist__link widget__link btn" href="/tags/ssti/" title="SSTI">SSTI (1)</a>
274+
<a class="widget-taglist__link widget__link btn" href="/tags/vulnerability-research/" title="Vulnerability-Research">Vulnerability-Research (1)</a>
149275
</div>
150276
</div>
151277

@@ -155,7 +281,7 @@ <h4 class="widget__title">Tags</h4>
155281
<div class="container footer__container flex">
156282

157283
<div class="footer__copyright">
158-
&copy; 2025 .
284+
&copy; 2025 PwnFuzz - Security Research &amp; Exploit Development.
159285
<span class="footer__copyright-credits">Generated with <a href="https://gohugo.io/" rel="nofollow noopener" target="_blank">Hugo</a> and <a href="https://github.com/Vimux/Mainroad/" rel="nofollow noopener" target="_blank">Mainroad</a> theme.</span>
160286
</div>
161287
</div>

0 commit comments

Comments
 (0)