11<!DOCTYPE html>
22< html class ="no-js " lang ="en ">
3- < head > < script src =" /livereload.js?mindelay=10&v=2&port=1313&path=livereload " data-no-instant defer > </ script >
3+ < head >
44 < meta charset ="UTF-8 ">
55 < meta name ="viewport " content ="width=device-width, initial-scale=1 ">
6- < title > 404 Page not found - </ title >
6+ < title > 404 Page not found - PwnFuzz - Security Research & Exploit Development </ title >
77 < script > ( function ( d , e ) { d [ e ] = d [ e ] . replace ( "no-js" , "js" ) ; } ) ( document . documentElement , "className" ) ; </ script >
88 < meta name ="description " content ="">
9- < meta property ="og:url " content ="http://localhost:1313/404.html ">
9+
10+
11+
12+ < meta name ="robots " content ="index, follow ">
13+ < meta name ="author " content ="map[avatar:/img/profile-placeholder.jpg bio:Vulnerability Researcher, Exploit Developer name:D4mianWayne] ">
14+ < meta name ="keywords " content ="pwnfuzz, security research, exploit development, vulnerability analysis, binary exploitation, fuzzing, red team, penetration testing, CVE analysis, offensive security ">
15+
16+
17+ < link rel ="canonical " href ="https://pwnfuzz.com/404.html ">
18+
19+
20+
21+ < meta property ="og:site_name " content ="PwnFuzz - Security Research & Exploit Development ">
22+ < meta property ="og:title " content ="404 Page not found - PwnFuzz - Security Research & Exploit Development ">
23+ < meta property ="og:description " content ="">
24+ < meta property ="og:url " content ="https://pwnfuzz.com/404.html ">
25+ < meta property ="og:type " content ="article ">
26+ < meta property ="og:locale " content ="en ">
27+
28+
29+
30+
31+
32+
33+ < meta property ="article:published_time " content ="0001-01-01T00:00:00Z ">
34+
35+
36+
37+
38+
39+
40+
41+ < meta name ="twitter:card " content ="summary_large_image ">
42+ < meta name ="twitter:site " content ="@D4mianWayne ">
43+ < meta name ="twitter:creator " content ="@D4mianWayne ">
44+ < meta name ="twitter:title " content ="404 Page not found ">
45+ < meta name ="twitter:description " content ="">
46+
47+
48+
49+
50+
51+
52+
53+
54+ < script type ="application/ld+json ">
55+ {
56+ "@context" : "https://schema.org" ,
57+ "@type" : "Article" ,
58+ "headline" : "404 Page not found" ,
59+ "description" : "" ,
60+ "image" : "https://pwnfuzz.com/img/pwnfuzz.png" ,
61+ "author" : {
62+ "@type" : "Person" ,
63+ "name" : "D4mianWayne"
64+ } ,
65+ "publisher" : {
66+ "@type" : "Organization" ,
67+ "name" : "PwnFuzz" ,
68+ "logo" : {
69+ "@type" : "ImageObject" ,
70+ "url" : "https://pwnfuzz.com/img/pwnfuzz.png"
71+ }
72+ } ,
73+ "datePublished" : "0001-01-01T00:00:00Z" ,
74+ "dateModified" : "0001-01-01T00:00:00Z" ,
75+ "mainEntityOfPage" : {
76+ "@type" : "WebPage" ,
77+ "@id" : "https:\/\/pwnfuzz.com\/404.html"
78+ }
79+ }
80+ </ script >
81+
82+
83+
84+ < meta http-equiv ="X-Content-Type-Options " content ="nosniff ">
85+ < meta http-equiv ="X-Frame-Options " content ="DENY ">
86+ < meta http-equiv ="X-XSS-Protection " content ="1; mode=block ">
87+ < meta name ="referrer " content ="strict-origin-when-cross-origin ">
88+
89+
90+
91+
92+
93+
94+
95+
96+
97+
98+
99+
100+
101+
102+
103+ < script type ="application/ld+json ">
104+ {
105+ "@context" : "https://schema.org" ,
106+ "@type" : "WebSite" ,
107+ "name" : "PwnFuzz" ,
108+ "url" : "https://pwnfuzz.com" ,
109+ "potentialAction" : {
110+ "@type" : "SearchAction" ,
111+ "target" : "https://pwnfuzz.com/search?q={search_term_string}" ,
112+ "query-input" : "required name=search_term_string"
113+ }
114+ }
115+ </ script >
116+ < meta property ="og:url " content ="https://pwnfuzz.com/404.html ">
117+ < meta property ="og:site_name " content ="PwnFuzz - Security Research & Exploit Development ">
10118 < meta property ="og:title " content ="404 Page not found ">
11- < meta property ="og:description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
119+ < meta property ="og:description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
12120 < meta property ="og:locale " content ="en_us ">
13121 < meta property ="og:type " content ="website ">
14122
15123
16124 < meta itemprop ="name " content ="404 Page not found ">
17- < meta itemprop ="description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
125+ < meta itemprop ="description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
18126
19127 < meta name ="twitter:card " content ="summary ">
20128 < meta name ="twitter:title " content ="404 Page not found ">
21- < meta name ="twitter:description " content ="Pwnfuzz - Exploring the world of fuzzing , binary exploitation, and exploit engineering! ">
129+ < meta name ="twitter:description " content ="PwnFuzz - Expert security research and exploit development. Deep dive into vulnerability analysis , binary exploitation, fuzzing techniques, and offensive security methodologies. ">
22130
23131 < link rel ="preconnect " href ="https://fonts.gstatic.com " crossorigin >
24132 < link rel ="dns-prefetch " href ="//fonts.googleapis.com ">
30138
31139 < link rel ="shortcut icon " href ="/favicon.ico ">
32140
141+
142+ < script async src ="https://www.googletagmanager.com/gtag/js?id=G-R5CC5776NV "> </ script >
143+ < script >
144+ var doNotTrack = false ;
145+ if ( false ) {
146+ var dnt = ( navigator . doNotTrack || window . doNotTrack || navigator . msDoNotTrack ) ;
147+ var doNotTrack = ( dnt == "1" || dnt == "yes" ) ;
148+ }
149+ if ( ! doNotTrack ) {
150+ window . dataLayer = window . dataLayer || [ ] ;
151+ function gtag ( ) { dataLayer . push ( arguments ) ; }
152+ gtag ( 'js' , new Date ( ) ) ;
153+ gtag ( 'config' , 'G-R5CC5776NV' ) ;
154+ }
155+ </ script >
33156</ head >
34157< body class ="body ">
35158 < div class ="container container--outer ">
@@ -102,7 +225,7 @@ <h1 class="warning__headline">404. Page not found</h1>
102225 < form class ="widget-search__form " role ="search " method ="get " action ="https://google.com/search ">
103226 < input class ="widget-search__field " type ="search " placeholder ="Search… " value ="" name ="q " aria-label ="Search… ">
104227 < input class ="widget-search__submit " type ="submit " value ="Search ">
105- < input type ="hidden " name ="sitesearch " value ="http ://localhost:1313 / ">
228+ < input type ="hidden " name ="sitesearch " value ="https ://pwnfuzz.com / ">
106229 </ form >
107230</ div >
108231< div class ="widget-recent widget ">
@@ -136,16 +259,19 @@ <h4 class="widget__title">Tags</h4>
136259 < a class ="widget-taglist__link widget__link btn " href ="/tags/.net/ " title =".NET "> .NET (1)</ a >
137260 < a class ="widget-taglist__link widget__link btn " href ="/tags/1day/ " title ="1day "> 1day (1)</ a >
138261 < a class ="widget-taglist__link widget__link btn " href ="/tags/auth-bypass/ " title ="Auth-Bypass "> Auth-Bypass (1)</ a >
262+ < a class ="widget-taglist__link widget__link btn " href ="/tags/crushftp/ " title ="CrushFTP "> CrushFTP (1)</ a >
139263 < a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-37297/ " title ="CVE-2024-37297 "> CVE-2024-37297 (1)</ a >
140264 < a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-4040/ " title ="Cve-2024-4040 "> Cve-2024-4040 (1)</ a >
141265 < a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-53675/ " title ="CVE-2024-53675 "> CVE-2024-53675 (1)</ a >
142266 < a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2024-53676/ " title ="CVE-2024-53676 "> CVE-2024-53676 (1)</ a >
143267 < a class ="widget-taglist__link widget__link btn " href ="/tags/cve-2025-2825/ " title ="CVE-2025-2825 "> CVE-2025-2825 (1)</ a >
144268 < a class ="widget-taglist__link widget__link btn " href ="/tags/example/ " title ="Example "> Example (1)</ a >
269+ < a class ="widget-taglist__link widget__link btn " href ="/tags/exploit-development/ " title ="Exploit-Development "> Exploit-Development (1)</ a >
145270 < a class ="widget-taglist__link widget__link btn " href ="/tags/logic-flaw/ " title ="Logic-Flaw "> Logic-Flaw (1)</ a >
146271 < a class ="widget-taglist__link widget__link btn " href ="/tags/oob-xxe/ " title ="OOB-XXE "> OOB-XXE (1)</ a >
147272 < a class ="widget-taglist__link widget__link btn " href ="/tags/path-traversal/ " title ="Path Traversal "> Path Traversal (1)</ a >
148273 < a class ="widget-taglist__link widget__link btn " href ="/tags/ssti/ " title ="SSTI "> SSTI (1)</ a >
274+ < a class ="widget-taglist__link widget__link btn " href ="/tags/vulnerability-research/ " title ="Vulnerability-Research "> Vulnerability-Research (1)</ a >
149275 </ div >
150276</ div >
151277
@@ -155,7 +281,7 @@ <h4 class="widget__title">Tags</h4>
155281 < div class ="container footer__container flex ">
156282
157283 < div class ="footer__copyright ">
158- © 2025 .
284+ © 2025 PwnFuzz - Security Research & Exploit Development .
159285 < span class ="footer__copyright-credits "> Generated with < a href ="https://gohugo.io/ " rel ="nofollow noopener " target ="_blank "> Hugo</ a > and < a href ="https://github.com/Vimux/Mainroad/ " rel ="nofollow noopener " target ="_blank "> Mainroad</ a > theme.</ span >
160286 </ div >
161287 </ div >
0 commit comments