From 9091373f8c2ba9a154478c4cce04c514ebaa9078 Mon Sep 17 00:00:00 2001 From: SirBroccoli Date: Wed, 3 Sep 2025 12:27:00 +0200 Subject: [PATCH] Update README.md --- .../python/bypass-python-sandboxes/README.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/src/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md b/src/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md index a15f28b52..e4cff9ebc 100644 --- a/src/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md +++ b/src/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md @@ -4,11 +4,6 @@ These are some tricks to bypass python sandbox protections and execute arbitrary commands. -> See also Lua sandboxes and game client escapes: -{{#ref}} -../../lua/bypass-lua-sandboxes/README.md -{{#endref}} - ## Command Execution Libraries