Translated ['src/generic-methodologies-and-resources/python/README.md',

This commit is contained in:
Translator 2025-08-19 21:31:29 +00:00
parent 6c8f9765f1
commit 80fa17d35c
2 changed files with 6 additions and 6 deletions

View File

@ -5,8 +5,8 @@
**Kontrol edilecek ilginç sayfalar:**
- [**Pyscript hacking tricks**](pyscript.md)
- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python)
- [**Python sandboxlarını atlatma teknikleri**](bypass-python-sandboxes/index.html)
- [**Python deserialization'ları**](../../pentesting-web/deserialization/README.md)
- [**Python sandbox'larını atlatma hileleri**](bypass-python-sandboxes/README.md)
- [**Temel python web istekleri sözdizimi**](web-requests.md)
- [**Temel python sözdizimi ve kütüphaneleri**](basic-python.md)

View File

@ -8,18 +8,18 @@ Olası bir **kod yürütmesi** test edin, _str()_ fonksiyonunu kullanarak:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
### Hileler
### Tricks
{{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/ssti-server-side-template-injection/
../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/deserialization/
../../pentesting-web/deserialization/README.md
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}