https://q3k.org/

提交的 URL:
https://q3k.org/
报告完成时间:

链接 · 找到 2 个

从页面中识别出的传出链接

链接文本
https://social.hackerspace.pl/@q3k@[email protected])
https://ko-fi.com/q3kq3kbuy me a coffee

JavaScript 变量 · 找到 3 个

在页面窗口对象上加载的全局 JavaScript 变量是在函数外部声明的变量,可以从当前范围内的代码中的任何位置访问

名称类型
onbeforetoggleobject
documentPictureInPictureobject
onscrollendobject

控制台日志消息 · 找到 0 条

记录到 Web 控制台的消息

HTML

页面的原始 HTML 正文

<!DOCTYPE html><html><head><meta charset="utf-8">

<title>q3k</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="shortcut icon" type="image/png" href="/favicon.png">
<style>
body {
    font: courier, sans-serif;
    font-size: 12px;
    text-align: center;
    margin-top: 100px;
}
</style>
</head><body><p>
    <b>Hi there. I'm q3k. Thanks for stopping by.</b>
</p>
<p>
   If you're looking to get in touch, email me at q3k@ this website, or find me on libera (q3k), Matrix (@q3k:hackerspace.pl) or the Fediverse (<a href="https://social.hackerspace.pl/@q3k" rel="me">@[email protected])</a>.
</p>
<p>
    GPG Key: 63DF E737 F078 657C C8A5  1C00 C29A DD73 B356 3D82
</p>
<p style="margin-top: 50px;">
    <b>Writings:</b>
    </p><ul style="list-style: none;">
        <li>2024/06/11: PL: <a href="/2024-06-11-pap-newag-pl.html">„Zainstalowane przez hackerów oprogramowanie“ - jak PAP.pl kłamie o aferze z Newagiem</a></li>
        <li>2024/06/11: EN: <a href="/2024-06-11-pap-newag-en.html">“Software installed by hackers”- how the Polish Press Agency lies about the Newag scandal</a></li>
        <li>2023/01/13: <a href="/wInd3x.html">wInd3x, the iPod Bootrom exploit 10 years too late</a></li>
        <li>2022/03/21: <a href="/lanai.html">Lanai, the mystery CPU architecture in LLVM</a></li>
    </ul>
<p></p>
<p style="margin-top: 50px;">
  <a href="https://ko-fi.com/q3kq3k">buy me a coffee</a>
</p>
</body></html>