Backlinks
| Referring page | DR | Ref. domains | Linked domains | Anchor and target URL |
|---|---|---|---|---|
|
mailing:announcement:20240611_01
https://net.nthu.edu.tw/netsys/mailing:announcement:20240611_01
net.nthu.edu.tw
|
55 | 5 | 10 |
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability/#1-%E5%B0%8D%E7%84%A1%E6%B3%95%E6%9B%B4%E6%96%B0-php-%E7%9A%84%E4%BD%BF%E7%94%A8%E8%80%85
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability
NOFOLLOW
|
|
cookie
http://www.vixual.net/blog/archives/tag/cookie
vixual.net
|
47 | 10 | 555 |
HTTP Session 攻擊與防護 | DEVCORE 戴夫寇爾
https://devco.re/blog/2014/06/03/http-session-protection
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://www.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
risky.biz
|
72 | 93 | 2,053 |
third part
https://devco.re/blog/2025/05/17/frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities-en
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://www.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
risky.biz
|
72 | 93 | 2,053 |
KS Event
https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2-en
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://www.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
risky.biz
|
72 | 93 | 2,053 |
MSKSSRV
https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en
DOFOLLOW
|
|
coalition-scanning-engine-helps-policyholders-respond
https://www.coalitioninc.com/en-ca/blog/security-labs/coalition-scanning-engine-helps-policyholders-respond
coalitioninc.com
|
71 | 66 | 275 |
great article
https://devco.re/blog/2021/08/06/a-new-attack-surface-on-MS-exchange-part-1-ProxyLogon
DOFOLLOW
|
|
pulse-secure-pulse-connect-secure-xss-reflected-cve-2019-...
https://s4e.io/tools/pulse-secure-pulse-connect-secure-xss-reflected-cve-2019-11507
s4e.io
|
12 | 6 | 565 |
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study
DOFOLLOW
|
|
binaergewitter-talk-number-194-langsam-ist-sicher
http://blog.binaergewitter.de/2018/03/09/binaergewitter-talk-number-194-langsam-ist-sicher
blog.binaergewitter.de
|
11 | 6 | 761 |
Exim Off-by-one RCE (CVE-2018-6789)
https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en
DOFOLLOW
|
|
11
https://lists.cert.at/mailman3/hyperkitty/list/[email protected]/2023/11?page=2
lists.cert.at
|
8 | 2 | 427 |
https://devco.re/blog/2023/11/06/your-printer-is-not-your-printer-hacking-p…
https://devco.re/blog/2023/11/06/your-printer-is-not-your-printer-hacking-printers-pwn2own-part2-en
NOFOLLOW
|
|
1462-the-severity-of-the-elevation-of-privilege-micro
https://avleonov.com/2024/10/22/1462-the-severity-of-the-elevation-of-privilege-micro
avleonov.com
|
9 | 4 | 238 |
October 5
https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2-en
DOFOLLOW
|
|
1462-the-severity-of-the-elevation-of-privilege-micro
https://avleonov.com/2024/10/22/1462-the-severity-of-the-elevation-of-privilege-micro
avleonov.com
|
9 | 4 | 238 |
August 23
https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://news.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
news.risky.biz
|
16 | 36 | 3,292 |
third part
https://devco.re/blog/2025/05/17/frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities-en
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://news.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
news.risky.biz
|
16 | 36 | 3,292 |
KS Event
https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2-en
DOFOLLOW
|
|
risky-bulletin-japan-passes-active-cyber-defense-law
https://news.risky.biz/risky-bulletin-japan-passes-active-cyber-defense-law
news.risky.biz
|
16 | 36 | 3,292 |
MSKSSRV
https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en
DOFOLLOW
|
|
timhsu.chroot.org
https://timhsu.chroot.org/
timhsu.chroot.org
|
8 | 2 | 101 |
這篇
http://devco.re/blog/2014/09/30/shellshock-CVE-2014-6271
DOFOLLOW
|
|
timhsu.chroot.org
https://timhsu.chroot.org/
timhsu.chroot.org
|
8 | 2 | 101 |
DevCore
http://devco.re/
DOFOLLOW
|
|
trovare-sottodomini-un-sito
https://hacktips.it/trovare-sottodomini-un-sito
hacktips.it
|
7 | 3 | 136 |
ricercatore
http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver
DOFOLLOW
|
|
400000-servers-exim-bug
https://www.tripwire.com/state-of-security/400000-servers-exim-bug
tripwire.com
|
78 | 508 | 2,267 |
fears
https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en
NOFOLLOW
|
|
blog.caspersun.club
|
9 | 1 | 11 |
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
https://devco.re/blog/2021/08/06/a-new-attack-surface-on-MS-exchange-part-1-ProxyLogon
DOFOLLOW
|
|
from-decades-old-vulnerabilities-to-new-zero-days-this-we...
https://www.loginsoft.com/reports/weekly/from-decades-old-vulnerabilities-to-new-zero-days-this-weeks-vulnerability-trends
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
76
http://www.vixual.net/blog/archives/76
vixual.net
|
47 | 10 | 555 |
OpenSSL CVE-2014-0160 Heartbleed 嚴重漏洞 | DEVCORE 戴夫寇爾
http://devco.re/blog/2014/04/09/openssl-heartbleed-CVE-2014-0160
DOFOLLOW
|
|
5-important-issues-for-effective-server-and-internet-serv...
https://blog.cloudmax.com.tw/5-important-issues-for-effective-server-and-internet-service-backup-and-recovery-bcp-strategy-mindset-part-6
blog.cloudmax.com.tw
|
49 | 3 | 36 |
紅隊演練
https://devco.re/services/red-team
DOFOLLOW
|
|
CVE-2019-11510
https://nvd.nist.gov/vuln/detail/CVE-2019-11510?ref=carlscloud.com
nvd.nist.gov
|
82 | 2,122 | 2,077 |
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study
DOFOLLOW
|
|
ithome.com.tw
|
76 | 267 | 1,890 |
發表部落格文章表示
http://devco.re/blog/2014/05/07/vote.tw.am-potential-phishing-site
DOFOLLOW
|
|
exploits-escalate-kev-inclusions-botnet-activity-and-malw...
https://www.loginsoft.com/reports/weekly/exploits-escalate-kev-inclusions-botnet-activity-and-malware-campaigns
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
zero-day-exploitation-accelerates-across-core-enterprise-...
https://www.loginsoft.com/reports/weekly/zero-day-exploitation-accelerates-across-core-enterprise-infrastructure
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
cq956rp0lnechd244tog
https://rivers.chaitin.cn/blog/cq956rp0lnechd244tog
rivers.chaitin.cn
|
61 | 7 | 751 |
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability/
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability
DOFOLLOW
|
|
21-top-taipei-cyber-security-companies-and-startups
https://beststartup.asia/21-top-taipei-cyber-security-companies-and-startups
beststartup.asia
|
12 | 12 | 22,621 |
Website
https://devco.re/en
DOFOLLOW
|
|
1232
https://pastevent.cybersec.ithome.com.tw/2022/product-page/1232
pastevent.cybersec.ithome.com.tw
|
— | 0 | 125 |
產品網址
https://devco.re/services/red-team
DOFOLLOW
|
|
BN-ARTICLE-31859
https://www.bnext.com.tw/article/31859/BN-ARTICLE-31859
bnext.com.tw
|
77 | 358 | 1,866 |
全球駭客的殺戮祭典
http://devco.re/blog/2014/04/11/openssl-heartbleed-how-to-hack-how-to-protect
DOFOLLOW
|
|
revelan-vulnerabilidad-critica-en-el-kernel-de-windows-qu...
https://1000tipsinformaticos.com/revelan-vulnerabilidad-critica-en-el-kernel-de-windows-que-permite-acceso-completo-al-sistema
1000tipsinformaticos.com
|
50 | 5 | 20 |
DEVCORE
https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en
NOFOLLOW
|
|
march-kicks-off-with-major-exploits
https://www.loginsoft.com/reports/weekly/march-kicks-off-with-major-exploits
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
驗證對外-ip-不求人,架設自己的-myip-網站
https://shazi.info/%E9%A9%97%E8%AD%89%E5%B0%8D%E5%A4%96-ip-%E4%B8%8D%E6%B1%82%E4%BA%BA%EF%BC%8C%E6%9E%B6%E8%A8%AD%E8%87%AA%E5%B7%B1%E7%9A%84-myip-%E7%B6%B2%E7%AB%99
shazi.info
|
9 | 3 | 116 |
如何正確的取得使用者 IP?
http://devco.re/blog/2014/06/19/client-ip-detection
DOFOLLOW
|
|
iis-rev-proxy-setup
https://blog.darkthread.net/blog/iis-rev-proxy-setup
blog.darkthread.net
|
17 | 29 | 663 |
(no anchor)
https://devco.re/blog/2014/06/19/client-ip-detection
DOFOLLOW
|
|
nueva-vulnerabilidad-php-expone-servidores-windows-a-la-e...
https://blogs.masterhacks.net/uncategorized/nueva-vulnerabilidad-php-expone-servidores-windows-a-la-ejecucion-remota-de-codigo
blogs.masterhacks.net
|
52 | 5 | 165 |
comentó
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
iot-attacks-surge-as-threat-actors-accelerate-critical-vu...
https://www.loginsoft.com/reports/weekly/iot-attacks-surge-as-threat-actors-accelerate-critical-vulnerability-exploitation
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
chinese-apts-evolve-stealth-zero-day-abuse
https://riskybiznews.substack.com/p/chinese-apts-evolve-stealth-zero-day-abuse
riskybiznews.substack.com
|
58 | 11 | 1,488 |
write-up
https://devco.re/blog/2023/10/05/your-printer-is-not-your-printer-hacking-printers-pwn2own-part1-en
DOFOLLOW
|
|
chinese-apts-evolve-stealth-zero-day-abuse
https://riskybiznews.substack.com/p/chinese-apts-evolve-stealth-zero-day-abuse
riskybiznews.substack.com
|
58 | 11 | 1,488 |
part two
https://devco.re/blog/2023/11/06/your-printer-is-not-your-printer-hacking-printers-pwn2own-part2-en
DOFOLLOW
|
|
windows-10-secure-rdp-remote-desktop-protocol
https://iqmore.tw/windows-10-secure-rdp-remote-desktop-protocol
iqmore.tw
|
13 | 10 | 362 |
(no anchor)
https://devco.re/blog/2020/03/04/telework-security
DOFOLLOW
|
|
449833
https://forum.ettoday.net/news/449833
forum.ettoday.net
|
62 | 34 | 91 |
戴夫寇爾部落格
http://devco.re/blog/2015/01/09/information-security-insight-kham
DOFOLLOW
|
|
cyber-chaos-unfolds-zero-days-botnets-espionage-surge-thi...
https://www.loginsoft.com/reports/weekly/cyber-chaos-unfolds-zero-days-botnets-espionage-surge-this-week
loginsoft.com
|
8 | 2 | 221 |
True
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
php
https://avleonov.com/tag/php
avleonov.com
|
9 | 4 | 238 |
DEVCORE suggest
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
DEVCORE 2024 第六屆實習生計畫
https://devco.re/blog/2024/07/18/6th-internship-program-recruit
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
全境擴散:從 Windows 11 到 Libarchive 的 Half-Day 威脅與全面影響
https://devco.re/blog/2025/02/12/from-convenience-to-contagion-the-half-day-threat-and-libarchive-vulnerabilities-lurking-in-windows-11
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
資安通報:PHP 遠端程式碼執行 (CVE-2024-4577) - PHP CGI 參數注入弱點
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
Angelboy 入列微軟 MSRC 2024 前百大最有價值資安研究員!
https://devco.re/blog/2024/08/08/msrc-2024-most-valuable-security-researchers-angelboy
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
WorstFit: Unveiling Hidden Transformers in Windows ANSI!
https://devco.re/blog/2025/01/09/worstfit-unveiling-hidden-transformers-in-windows-ansi
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
Streaming vulnerabilities from Windows Kernel - Proxying to Kernel - Part II
https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
紅隊演練專家應徵指南
https://devco.re/blog/2024/07/09/guide-to-applying-for-red-team-specialist
DOFOLLOW
|
|
devcore
https://red.osx.asia/sources/devcore
red.osx.asia
|
— | 0 | 50 |
MSRC 2024 Most Valuable Security Researchers - Angelboy
https://devco.re/blog/2024/08/08/msrc-2024-most-valuable-security-researchers-angelboy-en
DOFOLLOW
|
Frequently Asked Questions
How many backlinks does devco.re have?
The backlinks page for devco.re shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on devco.re. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to devco.re dofollow or nofollow?
Backlinks to devco.re include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.