Translated ['src/generic-methodologies-and-resources/python/README.md',

This commit is contained in:
Translator 2025-08-19 21:31:33 +00:00
parent a03423e32c
commit 9a8fe31b00
2 changed files with 6 additions and 6 deletions

View File

@ -5,8 +5,8 @@
**Pagine interessanti da controllare:**
- [**Trucchi di hacking Pyscript**](pyscript.md)
- [**Deserializzazioni Python**](../../pentesting-web/deserialization/index.html#python)
- [**Trucchi per bypassare le sandbox Python**](bypass-python-sandboxes/index.html)
- [**Deserializzazioni Python**](../../pentesting-web/deserialization/README.md)
- [**Trucchi per bypassare le sandbox Python**](bypass-python-sandboxes/README.md)
- [**Sintassi di base delle richieste web in Python**](web-requests.md)
- [**Sintassi e librerie di base di Python**](basic-python.md)

View File

@ -4,22 +4,22 @@
## Server usando python
testare una possibile **esecuzione di codice**, utilizzando la funzione _str()_:
testare una possibile **esecuzione di codice**, usando la funzione _str()_:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
### Tricks
{{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/ssti-server-side-template-injection/
../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/deserialization/
../../pentesting-web/deserialization/README.md
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}