This commit is contained in:
carlospolop 2025-08-19 23:17:13 +02:00
parent 47ca570e97
commit 4901a819da
2 changed files with 5 additions and 5 deletions

View File

@ -6,8 +6,8 @@
**Interesting pages to check:** **Interesting pages to check:**
- [**Pyscript hacking tricks**](pyscript.md) - [**Pyscript hacking tricks**](pyscript.md)
- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python) - [**Python deserializations**](../../pentesting-web/deserialization/README.md)
- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/index.html) - [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/README.md)
- [**Basic python web requests syntax**](web-requests.md) - [**Basic python web requests syntax**](web-requests.md)
- [**Basic python syntax and libraries**](basic-python.md) - [**Basic python syntax and libraries**](basic-python.md)

View File

@ -13,15 +13,15 @@ test a possible **code execution**, using the function _str()_:
### Tricks ### Tricks
{{#ref}} {{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/ ../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}} {{#endref}}
{{#ref}} {{#ref}}
../../pentesting-web/ssti-server-side-template-injection/ ../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}} {{#endref}}
{{#ref}} {{#ref}}
../../pentesting-web/deserialization/ ../../pentesting-web/deserialization/README.md
{{#endref}} {{#endref}}
{{#include ../../banners/hacktricks-training.md}} {{#include ../../banners/hacktricks-training.md}}