- 扫描 ID:
- 6019f768-fbc2-4e8e-b3f8-0a0a423d09c5已完成
- 提交的 URL:
- https://q3k.org/
- 报告完成时间:
链接 · 找到 2 个
从页面中识别出的传出链接
链接 | 文本 |
---|---|
https://social.hackerspace.pl/@q3k | @[email protected]) |
https://ko-fi.com/q3kq3k | buy me a coffee |
JavaScript 变量 · 找到 3 个
在页面窗口对象上加载的全局 JavaScript 变量是在函数外部声明的变量,可以从当前范围内的代码中的任何位置访问
名称 | 类型 |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
控制台日志消息 · 找到 0 条
记录到 Web 控制台的消息
HTML
页面的原始 HTML 正文
<!DOCTYPE html><html><head><meta charset="utf-8">
<title>q3k</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="shortcut icon" type="image/png" href="/favicon.png">
<style>
body {
font: courier, sans-serif;
font-size: 12px;
text-align: center;
margin-top: 100px;
}
</style>
</head><body><p>
<b>Hi there. I'm q3k. Thanks for stopping by.</b>
</p>
<p>
If you're looking to get in touch, email me at q3k@ this website, or find me on libera (q3k), Matrix (@q3k:hackerspace.pl) or the Fediverse (<a href="https://social.hackerspace.pl/@q3k" rel="me">@[email protected])</a>.
</p>
<p>
GPG Key: 63DF E737 F078 657C C8A5 1C00 C29A DD73 B356 3D82
</p>
<p style="margin-top: 50px;">
<b>Writings:</b>
</p><ul style="list-style: none;">
<li>2024/06/11: PL: <a href="/2024-06-11-pap-newag-pl.html">„Zainstalowane przez hackerów oprogramowanie“ - jak PAP.pl kłamie o aferze z Newagiem</a></li>
<li>2024/06/11: EN: <a href="/2024-06-11-pap-newag-en.html">“Software installed by hackers”- how the Polish Press Agency lies about the Newag scandal</a></li>
<li>2023/01/13: <a href="/wInd3x.html">wInd3x, the iPod Bootrom exploit 10 years too late</a></li>
<li>2022/03/21: <a href="/lanai.html">Lanai, the mystery CPU architecture in LLVM</a></li>
</ul>
<p></p>
<p style="margin-top: 50px;">
<a href="https://ko-fi.com/q3kq3k">buy me a coffee</a>
</p>
</body></html>