diff --git a/src/generic-methodologies-and-resources/python/README.md b/src/generic-methodologies-and-resources/python/README.md index 92dfdb4fc..2943a082b 100644 --- a/src/generic-methodologies-and-resources/python/README.md +++ b/src/generic-methodologies-and-resources/python/README.md @@ -6,8 +6,8 @@ **Interesting pages to check:** - [**Pyscript hacking tricks**](pyscript.md) -- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python) -- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/index.html) +- [**Python deserializations**](../../pentesting-web/deserialization/README.md) +- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/README.md) - [**Basic python web requests syntax**](web-requests.md) - [**Basic python syntax and libraries**](basic-python.md) diff --git a/src/network-services-pentesting/pentesting-web/python.md b/src/network-services-pentesting/pentesting-web/python.md index 42da06f2d..626351c45 100644 --- a/src/network-services-pentesting/pentesting-web/python.md +++ b/src/network-services-pentesting/pentesting-web/python.md @@ -13,15 +13,15 @@ test a possible **code execution**, using the function _str()_: ### Tricks {{#ref}} -../../generic-methodologies-and-resources/python/bypass-python-sandboxes/ +../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md {{#endref}} {{#ref}} -../../pentesting-web/ssti-server-side-template-injection/ +../../pentesting-web/ssti-server-side-template-injection/README.md {{#endref}} {{#ref}} -../../pentesting-web/deserialization/ +../../pentesting-web/deserialization/README.md {{#endref}} {{#include ../../banners/hacktricks-training.md}}