Quartz 🪬
Search
Search
Search
Dark mode
Light mode
Explorer
000 Computer Science
Linux
Commands
SSH
Miscellaneous
XML
XML Entities
Network
Application
DNS
DNS caching
DNS record
Data Link & Physical
ARP
Ethernet
Network
DHCP
ICMP
IP
IPv4
IPv4 classful
IPv4 classless
NAT
Subnet
Transport
SYN Cookie
TCP
TCP Connection Management
UDP
Programming with pcap
Raw Socket Programming
001 Software Development
Design Patterns
Design Patterns
Adapter
Builder
Chain of Responsibility
Decorator
Decorator Pattern in JavaScript
Dependency Injection
Design Pattern
Factory Method
Factory vs Prototype and Builder
Module Pattern
Observer
Prototype
Prototype vs Builder
Proxy
Singleton
Singleton in JavaScript
Template Method
ExpressJS
ExpressJS
Middleware
Application-level Middlewares
Built-in Middlewares
Configurable Middlewares
Error-handling Middlewares
Method Override
Middlware in Express
Morgan
Router-level Middlewares
Request
Request Properties in Express
Response
Handlebars in Express
Response Methods in Express
Serving Static Files in Express
Template Engine in Express
Routing
Express Route
Express Router
Route Handlers
Route Methods
Route Paths
Routing in Express
Setup
Create an Express Application
Express Generator
ExpressJS
Overriding Express API
JavaScript
JavaScript
001 Basics
Callback
Closure
Error Handling in JS
Higher Order Array Methods
Hoisting
Import JavaScript to HTML
JS Array Instance Methods
JS Array Static Methods
JS Arrays
JS Booleans
JS Constructor Function
JS Data Types
JS Functions
JS Loop
JS Object Methods
JS Objects
JS Operators
JS Prototype
JS Scopes
JS String Instance Methods
JS Strings
Lexical Environment
Self-Invoking Functions
002 Built-in Objects
JS Console
JS Date
JS Map
JS Math
JS Number
JS Regex
JS Set
JS URL
JS Window
JSON
JSON to Object
Object to JSON
003 Function Context
apply Method in JS
bind Method in JS
call Method in JS
JS this Keyword
004 DOM Manipulation
Create a DOM Element
DOM
DOM Attribute
DOM Element
DOM Text
Get a DOM Element
JS Event
Shadow DOM
Virtual DOM
Web Components
005 ES6
Array Destructuring
Arrow Function
Destructuring
JS Class
JS Module
JS Symbols
Object Destructuring
Optional Chaining
Rest Operator
Spread and Rest Operator
Spread Operator
Tagged Template Literals
Template Literals
006 Synchronization
Async & Await
Event Loop
Fetch API
Promise
Promise Chain
Promise Handler Methods
Promise Static Methods
Setting Time
Synchronous & Asynchronous in JS
Browser API
ECMAScript Specification
JavaScript
JS Convention
JS Engine
JS Garbage Collection
Strict mode
Web Storage
NodeJS
NodeJS
API
Axios
JSON Server
Build Tools
Babel
Vite
Webpack
Linting & Formatting
ESLint
ESLint and Prettier
Prettier
Utilities
Classnames
Config
Lodash
Moment
Nodemon
Pino
Environment Variable
Node Package Manager
Node Version Manager
NodeJS
Pnpm
Yarn
ReactJS
ReactJS
Adding Interactivity
State
useState
Functional Update
Immutability
State as a Snapshot
useState
State
React Event Handlers
Advanced Topics
React Under the Hood
Best Practices and Common Mistakes
React Convention
What are Good Alternatives to Data Fetching in Effects
Why not to Use Index as Key in React Lists
Why this Keyword in a Function of Class Component is Undefined
Decribing the UI
Component
Component Life-cycle
Mounting a React Component
React Component Life-cycle
React Life-cycle Methods
Unmouting a React Component
Updating a React Component
Class Component
Fragment
Functional Component
Higher Order Component
React Component
JSX Element
Attributes of a JSX Element
JSX Element
Passing Data to a JSX Element
Props
Context in React
Props
Render Prop
Conditional Rendering
Keeping Components Pure
Escape Hatches
Effect
useEffect
Each Effect Represents a Separate Synchronization Process
Problems with Dependency Array of useEffect
useEffect
Wrapping the DOM Update in Effect
Effect in React
You Might Not Need an Effect
Ref
Manipulating the DOM with Refs
Referencing Values with Refs
Hooks
Custom Hook
React Hook
useCallback
useDebugValue
useDeferredValue
useId
useImperativeHandle
useMemo
useReducer
useTransition
Managing State
Choosing the State Structure
Scaling Up with Reducer and Context
Sharing State Between Components
Setup
Create a React Application Manually
Create React App
ReactJS
Redux
Redux
App Structure
Redux
Providing the Redux Store
Redux App Structure
Using the Redux Store
Redux Toolkit
Creating the Redux Slice
Redux Toolkit App Structure
Using the Redux Slice
RTK Query
Automated Re-fetching in RTK Query
Basic Usage of RTK Query
Manual Cache Updates in RTK Query
Mutations in RTK Query
Queries in RTK Query
RTK Query
Terms and Concepts
Action
Action Creator
Dispatch Method
Reducer
Redux Application Data Flow
Selector
Slice
Store
Terminology of Redux
Redux
Redux DevTools Extension
Writing Logic with Thunks
V8 Engine
D8 Shell
V8 - Garbage Collection
V8 - Hidden Classes
V8 - Ignition
V8 - Inline Caching
V8 - Isolate and Context
V8 - Object Representation
V8 - Pointer Tagging and Pointer Compression
V8 - Sparkplug
V8 - Turbo Fan
V8 Engine
002 Cyber Security
Port Swigger
Port Swigger - Cross-Origin Resource Sharing
Port Swigger - Access-Control-Allow-Origin Response Header
Port Swigger - Cross-Origin Resource Sharing
Port Swigger - Same-Origin Policy
Port Swigger - Vulnerabilities Arising From CORS Configuration Issues
Port Swigger - Cross-Site Request Forgery
Client-Side Redirect
Open Authorization
Port Swigger - Bypassing Referer-based CSRF Defenses
Port Swigger - Bypassing CSRF Token Validation
Port Swigger - Bypassing SameSite Cookie Restrictions
Port Swigger - Cross-Site Request Forgery
Server-Side Redirect
Port Swigger - Cross-Site Scripting
Content Security Policy
Port Swigger - Bypassing CSP
Port Swigger - Cross-Site Scripting
Port Swigger - Dangling Markup Injection
Port Swigger - DOM XSS
Port Swigger - Exploiting Cross-Site Scripting Vulnerabilities
Port Swigger - Preventing XSS Attacks
Port Swigger - Reflected XSS
Port Swigger - Stored XSS
Port Swigger - XSS Contexts
Port Swigger - File Upload Vulnerabilities
Port Swigger - Exploiting File Upload Vulnerabilities without Remote Code Execution
Port Swigger - Exploiting Flawed Validation of File Uploads
Port Swigger - Exploiting Unrestricted File Uploads to Deploy a Web Shell
Port Swigger - File Upload Vulnerabilities
Port Swigger - HTTP Request Smuggling
Port Swigger - Advanced Request Smuggling
Port Swigger - Browser-Powered Request Smuggling
Port Swigger - Exploiting HTTP Request Smuggling Vulnerabilities
Port Swigger - Finding HTTP Request Smuggling Vulnerabilities
Port Swigger - HTTP Request Smuggling
Port Swigger - HTTP Request Tunnelling
Port Swigger - Response Queue Poisoning
Port Swigger - Insecure Deserialization
Port Swigger - Create Your Own Insecure Deserialization Exploit
Port Swigger - Exploiting Insecure Deserialization Vulnerabilities
Port Swigger - Gadget Chains for Insecure Deserialization
Port Swigger - Insecure Deserialization
Port Swigger - PHAR Deserialization
Port Swigger - JWT Attacks
Port Swigger - JWT Algorithm Confusion Attacks
Port Swigger - JWT Attacks
Port Swigger - JWT Header Parameter Injections
Port Swigger - OAuth Authentication
Port Swigger - OAuth Authentication
Port Swigger - Path Traversal
Port Swigger - Path Traversal
Port Swigger - Prototype Pollution
Port Swigger - Client-side Prototype Pollution Vulnerabilities
Port Swigger - Prototype Pollution
Port Swigger - Prototype Pollution via Browser APIs
Port Swigger - Remote Code Execution via Server-side Prototype Pollution
Port Swigger - Server-side Prototype Pollution Vulnerabilities
Port Swigger - Server-Side Request Forgery
Port Swigger - Blind SSRF
Port Swigger - Circumventing Common SSRF Defenses
Port Swigger - Server-Side Request Forgery
Shellshock
Port Swigger - Server-Side Template Injection
Port Swigger - Exploiting Server-Side Template Injection Vulnerabilities
Port Swigger - Server-Side Template Injection
Port Swigger - SQL Injection
Port Swigger - Blind SQL Injection
Port Swigger - Error-Based SQL Injection
Port Swigger - Examining the Database in SQL Attacks
Port Swigger - Out-of-Band SQL Injection
Port Swigger - Second-Order SQL Injection
Port Swigger - SQL Injection
Port Swigger - SQL Injection in Different Contexts
Port Swigger - Time-Based SQL Injection
Port Swigger - Union-Based SQL Injection
Prepared Statement
Port Swigger - WebSocket
Port Swigger - Cross-Site WebSocket Hijacking
Port Swigger - WebSocket
Port Swigger - WebSocket Security Vulnerabilities
Port Swigger - XXE Injection
Port Swigger - Blind XXE
Port Swigger - Finding Hidden Attack Surface for XXE Injection
Port Swigger - XXE Injection
Burp Suite Collaborator
Port Swigger
SEED Labs
SEED Lab - ARP Cache Poisoning
SEED Lab - Cross Site Request Forgery
SEED Lab - Cross Site Scripting
SEED Lab - DNS Infrastructure
SEED Lab - DNS Rebinding
SEED Lab - ICMP Redirect Attack
SEED Lab - Kaminsky Attack
SEED Lab - Local DNS Attack
SEED Lab - Mitnick Attack
SEED Lab - Sniffing and Spoofing
SEED Lab - SQL Injection
SEED Lab - TCP Attacks
SEED Labs
Tryhackme
Active Directory
Active Directory
Active Directory Credentials Harvesting
Breaching Active Directory
Enumerating Active Directory
Exploiting Active Directory
Lateral Movement and Pivoting
Persisting Active Directory
Burp Suite
Burp Suite
Burp Suite Basics
Burp Suite Extensions
Burp Suite Intruder
Burp Suite Other Modules
Burp Suite Repeater
Hashing
Hash
TryHackMe - Hashing
Introduction
Introduction to Defensive Security
Junior Security Analyst Intro
Pentesting Fundamentals
Principles of Security
Malware Analysis
TryHackMe - Advanced Dynamic Malware Analysis - Debugging
TryHackMe - Advanced Static Malware Analysis
TryHackMe - Anti-Reversing
TryHackMe - Dissecting PE Headers
TryHackMe - Dynamic Malware Analysis
TryHackMe - MalBuster
TryHackMe - MalDoc
TryHackMe - Static Malware Analysis
TryHackMe - Volatility
TryHackMe - Windows Internals
TryHackMe - x86 Architecture
TryHackMe - x86 Assembly
Metasploit
Metasploit
Metasploit - Exploitation
Metasploit Console
Metasploit Modules
Metasploit Multi-Handler
Metasploit Payloads
Metasploit Venom
Meterpreter
Network
HTTP in Detail
NetSec Challenge
Wireshark - The Basics
Nmap
Nmap
Nmap - Advanced Port Scans
Nmap - Basic Port Scans
Nmap - Live Host Discovery
Nmap - Post Port Scans
Password Attacking
Hydra
John the Ripper
Password Attacking
TryHackMe - Hydra
Persistence
TryHackMe - Windows Local Persistence
Phising
TryHackMe - Phishing
Privilege Escalation
Linux
Linux Privilege Escalation
Linux Privilege Escalation - Capabilities
Linux Privilege Escalation - Challenge
Linux Privilege Escalation - Cron Jobs
Linux Privilege Escalation - Enumeration
Linux Privilege Escalation - Kernel Exploits
Linux Privilege Escalation - NFS
Linux Privilege Escalation - PATH
Linux Privilege Escalation - Sudo
Linux Privilege Escalation - SUID
Windows
TryHackMe - Windows Fundamentals
Windows Privilege Escalation
Windows Privilege Escalation - Automated Tools
Windows Privilege Escalation - Abusing Dangerous Privileges
Windows Privilege Escalation - Abusing Service Misconfiguration
Windows Privilege Escalation - Abusing Vunerable Software
Windows Privilege Escalation - Harvesting Passwords From Usual Spots
Windows Privilege Escalation - Other Quick Wins
Introduction to Shells
Introduction to Shells - Practice and Examples
Privilege Escalation
Reconnaise
Active Reconnaise
Content Discovery
DNS Reconnaise
Google Dorking
Passive Reconnaise
Web Reconnaise
Red Team
Red Team Engagements
Rooms
Alfred
Basic Penetration Testing
Blue
Bounty Hacker
Brainpan
Brainstorm
Buffer Overflow Prep
Daily Bugle
Game Zone
Gatekeeper
Hack Park
Internal
Kenobi
MrRobot
Overpass
OWASP Top Ten 2021
Pickle Rick
Relevant
Retro
RootMe
Simple CTF
Skynet
Steel Mountain
Vulnversity
Scripting
TryHackMe - Bash Scripting
TryHackMe - Hacking with PowerShell
TryHackMe - PowerShell for Pentesters
TryHackMe - Python for Pentesters
Web Hacking
Command Injection
Command Injection
TryHackMe - Command Injection
File Inclusion
File Inclusion
File Inclusion Challenges
Local File Inclusion
Path Traversal
Remote File Inclusion
SSRF
Server-Side Request Forgery
Tryhackme - Server-Side Request Forgery
TryHackMe - Authentication Bypass
TryHackMe - Cross-Site Scripting - Perfecting Your Payload
TryHackMe - HTTP Request Smuggling
TryHackMe - Insecure Direct Object Reference
TryHackMe - SQL Injection
TryHackMe - Subdomain Enumeration
TryHackMe - Walking An Application
Security Engineer
Tryhackme
003 Blockchain Technology
Basics
Blockchain
Consensus Mechanisms
Plasma
Proof of Stake
Proof of Work
Provider
Sidechain
Token
Transaction in Blockchain
Cryptocurrency
Bitcoin
Bitcoin
Bitcoin Address
Bitcoin Transaction Input
Bitcoin Transaction Output
Bitcoin's Scripting Language
P2MS
P2PK
P2PKH
P2SH
Cryptocurrency
Hierarchical Deterministic Wallet
MetaMask
Stablecoin
Hyperledger Fabric
Articles
Potential Risks of Hyperledger Fabric Smart Contracts
Concepts
Hyperledger Fabric - Chaincode
Hyperledger Fabric - Channel
Hyperledger Fabric - Identity
Hyperledger Fabric - Introduction
Hyperledger Fabric - Ledger
Hyperledger Fabric - Membership Service Provider
Hyperledger Fabric - Ordering Service
Hyperledger Fabric - Peer
Hyperledger Fabric - Read-Write Set
Hyperledger Fabric - Transaction Flow
Tutorials
Hyperledger Fabric - Deploying a Chaincode to a Channel
Hyperledger Fabric - Installation
Hyperledger Fabric - Running a Fabric Application
Hyperledger Fabric - Upgrading a Chaincode
Hyperledger Fabric - Using the Test Network
Hyperledger Fabric
Oracle
Basic Request Model of Chainlink
Chainlink
Chainlink Data Feeds
Chainlink VRF
Oracle
Papers
An Overview of Smart Contract - Architecture, Applications, and Future Trends
Bitcoin - A Peer to Peer Electronic Cash System
Blockchain Challenges and Opportunities - a Survey
Slither - A Static Analysis Framework for Smart Contracts
Smart Contracts - Security Patterns in the Ethereum Ecosystem and Solidity
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract
Smart Contract
Environment
Hardhat
Configuration of Hardhat
Deploying with Hardhat
Getting Started with Hardhat
Hardhat
Hardhat Verify
Testing with Hardhat
Truffle
Configuration of Truffle
Getting Started with Truffle
Migrations in Truffle
Truffle
Truffle Dashboard
Interaction
Ethers
Common Terminology of Ethers
Contracts in Ethers
Ethers
Getting Ethers and Connecting to the Network
Signing Messages with Ethers
Web3JS
Calling Contract Functions with Web3JS
Handling Events with Web3JS
Set up Web3JS and Connect to the Network
Talking to Contracts with WebJS
Web3JS
Solidity
Access Control
Solidity - Function Modifiers
Solidity - Ownable
Data Management
Solidity - Data Location
Solidity - Data Types
Solidity - State Variables
Solidity - Variable Scopes
Solidity - Visibility
Ether-related
Solidity - Gas
Solidity - Special Functions
Solidity - Tokens
Solidity - Transfer Ether
Function
Solidity - Function
Solidity - Keccak256
Solidity - State Modifiers
Libraries
Solidity - Libraries
Solidity - SafeMath
OOP
Solidity - Abstract Contracts
Solidity - Constructor
Solidity - Inheritance
Solidity - Interface
Vulnerabilities
Reentrancy Vulnerability
Solidity
Solidity - Advanced Concepts
Solidity - Error Handling
Solidity - Events
Solidity - Layout of a Source File
Solidity - Units
Smart Contract
003 Blockchain Technology
Home
❯
001 Software Development
❯
V8 Engine
❯
V8 - Sparkplug
V8 - Sparkplug
Nov 21, 2024
1 min read
v8
later
Related
list
from outgoing([[V8 - Sparkplug]])
sort file.ctime asc
Resources
Table of Contents
Related
Resources
Backlinks
V8 Engine