Translated ['src/generic-methodologies-and-resources/python/README.md',

This commit is contained in:
Translator 2025-08-19 21:31:23 +00:00
parent d3c907f4fa
commit 86f3267118
2 changed files with 7 additions and 7 deletions

View File

@ -5,8 +5,8 @@
**チェックする興味深いページ:**
- [**Pyscript hacking tricks**](pyscript.md)
- [**Python deserializations**](../../pentesting-web/deserialization/index.html#python)
- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/index.html)
- [**Python deserializations**](../../pentesting-web/deserialization/README.md)
- [**Tricks to bypass python sandboxes**](bypass-python-sandboxes/README.md)
- [**Basic python web requests syntax**](web-requests.md)
- [**Basic python syntax and libraries**](basic-python.md)

View File

@ -4,22 +4,22 @@
## Pythonを使用したサーバー
関数 _str()_ を使用して、可能な **コード実行** をテストします:
可能な**コード実行**をテストするには、関数 _str()_ を使用します:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
### トリック
### Tricks
{{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/ssti-server-side-template-injection/
../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/deserialization/
../../pentesting-web/deserialization/README.md
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}