Explore >> Select a destination


You are here

kewah.com
| | cgamesplay.com
3.5 parsecs away

Travel
| | After configuring Prettier and ESLint for my JavaScript projects, I documented the streamlined process for others to easily achieve consistent code formatting and linting in their repositories.
| | www.thepolyglotdeveloper.com
1.8 parsecs away

Travel
| | Learn how to continuously deploy a static generated site to a remote server on push and on a schedule with GitLab CI.
| | biomejs.dev
2.7 parsecs away

Travel
| | Using Biome in a CI environment
| | parsiya.net
33.0 parsecs away

Travel
| [AI summary] The provided text is a detailed technical article discussing various methods and techniques for exploiting custom protocol handlers and command-line switches in applications. It covers topics such as UNC path injection, command-line switch abuse, remote file execution, and leveraging startup directories for persistence. The article also includes practical examples, tools like Nirsoft's URLProtocolView, and advice on how to discover and exploit vulnerabilities in applications.