Translated ['src/generic-methodologies-and-resources/python/README.md',

This commit is contained in:
Translator 2025-08-19 21:31:28 +00:00
parent f633812722
commit 29043a20a7
2 changed files with 7 additions and 7 deletions

View File

@ -5,9 +5,9 @@
**Interessante bladsye om na te kyk:**
- [**Pyscript hacking truuks**](pyscript.md)
- [**Python deserialisasies**](../../pentesting-web/deserialization/index.html#python)
- [**Truuks om python sandboxes te omseil**](bypass-python-sandboxes/index.html)
- [**Basiese python web versoek sintaksis**](web-requests.md)
- [**Python deserialisasies**](../../pentesting-web/deserialization/README.md)
- [**Truuks om python sandboxes te omseil**](bypass-python-sandboxes/README.md)
- [**Basiese python web versoeke sintaksis**](web-requests.md)
- [**Basiese python sintaksis en biblioteke**](basic-python.md)
{{#include ../../banners/hacktricks-training.md}}

View File

@ -4,22 +4,22 @@
## Bediener wat python gebruik
toets 'n moontlike **code uitvoering**, met die funksie _str()_:
toets 'n moontlike **kode-uitvoering**, met die funksie _str()_:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
### Tricks
{{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/ssti-server-side-template-injection/
../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/deserialization/
../../pentesting-web/deserialization/README.md
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}