René's URL Explorer Experiment


Title: hack.do

Open Graph Title: hack.do

X Title: hack.do

Description:

Opengraph URL: https://hack.do/

Generator: Hugo 0.148.2

direct link

Domain: hack.do


Hey, it has json ld scripts:
{"@context":"https://schema.org","@type":"WebSite","@id":"https:\/\/hack.do\/","name":"hack.do","inLanguage":"en","url":"https:\/\/hack.do\/","publisher":{"@type":"Person","name":"Matt Austin"}}

theme-color#FFFFFF
titlehack.do
og:site_namehack.do
og:localeen
og:typewebsite
twitter:cardsummary
authorMatt Austin

Links:

↓Skip to main contenthttps://hack.do#main-content
https://hack.do/
hack.dohttps://hack.do/
Bloghttps://hack.do/posts/
Abouthttps://hack.do/about/
WinBoat: Drive by Client RCE + Sandbox escape.https://hack.do/posts/winboat-guest-service-host-rce/
RCE in buf CLI (from http://buf.build)https://hack.do/posts/buf-cli-registry-login-rce/
CVE-2025-48938 - GitHub CLI RCEhttps://hack.do/posts/cve-2025-48938/
CVE-2021-30618 - Chrome Headless Remote Debugging RCE via XSShttps://hack.do/posts/cve-2021-30618/
Thinking Outside the Sandbox: Decoding and Defeating Node.js Permissionshttps://hack.do/posts/thinking-outside-the-sandbox/
Burp Suite RCE via Chrome Remote Debugginghttps://hack.do/posts/burp-suite-rce/
CVE-2023-30587 - Node.js Permission Bypass via Inspector Modulehttps://hack.do/posts/cve-2023-30587/
jsonwebtoken: String Payload Parsing Inconsistency Leads to Auth Bypasshttps://hack.do/posts/node-jsonwebtoken-string-payload-auth-bypass/
Node.js Permission Bypass via WASI Modulehttps://hack.do/posts/nodejs-wasi-permission-bypass/
CVE-2020-17091 - Microsoft Teams Desktop RCE via Missing Context Isolationhttps://hack.do/posts/cve-2020-17091/
Docker Desktop (formaly Kitematic) Container Escape and RCE via “Web Preview”https://hack.do/posts/docker-kitematic-rce/
Ghost CMS: Privilege Escalation via Post Previewhttps://hack.do/posts/ghost-code-injection-privilege-escalation/
CVE-2018-15685 - Electron WebPreferences Remote Code Executionhttps://hack.do/posts/cve-2018-15685/
XSS in Outlook Adaptive Cards via Action.OpenUrlhttps://hack.do/posts/outlook-adaptive-cards-xss/
Elmowned - Hacking Elmohttps://hack.do/posts/elmowned/
Unsafe Code Execution in static-evalhttps://hack.do/posts/static-eval/
Visual Studio Code 1.9.1: Arbitrary Code Execution via Markdown Previewhttps://hack.do/posts/vscode-markdown-preview-rce/
https://hack.do#the-top
Hugohttps://gohugo.io/
Congohttps://github.com/jpanther/congo

Viewport: width=device-width,initial-scale=1


URLs of crawlers that visited me.