|
You are here |
juffalow.com | ||
| | | | |
connorberry.com
|
|
| | | | | Language Comparison Perl: while (<>) { print "$. : $_" } Perl: while (<>) { print "$. : $_" } CSharp: using System; using System.IO; class App { public static void Main(string[] args) { int line_number = 1; foreach (string arg in args) { foreach (string line in File.ReadLines(arg)) { Console.WriteLine(line_number + ":" + line);... | |
| | | | |
github.com
|
|
| | | | | validate koa request params and format request params - GitHub - RocksonZeta/koa-validate: validate koa request params and format request params | |
| | | | |
badoption.eu
|
|
| | | | | ZipJar, a little bit unexpected attack chain The upcoming from the .zip TLDs from Google brought some discussion about attack vectors. Most of those attack vectors are not completely new, like using an "@" to split between username and host. While playing a little bit around, an unexpected attack chain appeared, involving a .zip TLD, Windows Explorer, WebDAV and a jar file. Some further reading and research: https://www.kaspersky.com/blog/zip-mov-domain-extension-confusion/48254/ https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse https://mrd0x.com/file-archiver-in-the-browser/ | |
| | | | |
benjiweber.co.uk
|
|
| | | |||