diff --git a/src/generic-methodologies-and-resources/python/README.md b/src/generic-methodologies-and-resources/python/README.md index 0ea67b77b..ca5d57290 100644 --- a/src/generic-methodologies-and-resources/python/README.md +++ b/src/generic-methodologies-and-resources/python/README.md @@ -5,8 +5,8 @@ **Pagine interessanti da controllare:** - [**Trucchi di hacking Pyscript**](pyscript.md) -- [**Deserializzazioni Python**](../../pentesting-web/deserialization/index.html#python) -- [**Trucchi per bypassare le sandbox Python**](bypass-python-sandboxes/index.html) +- [**Deserializzazioni Python**](../../pentesting-web/deserialization/README.md) +- [**Trucchi per bypassare le sandbox Python**](bypass-python-sandboxes/README.md) - [**Sintassi di base delle richieste web in Python**](web-requests.md) - [**Sintassi e librerie di base di Python**](basic-python.md) diff --git a/src/network-services-pentesting/pentesting-web/python.md b/src/network-services-pentesting/pentesting-web/python.md index dfe835855..11b32c421 100644 --- a/src/network-services-pentesting/pentesting-web/python.md +++ b/src/network-services-pentesting/pentesting-web/python.md @@ -4,22 +4,22 @@ ## Server usando python -testare una possibile **esecuzione di codice**, utilizzando la funzione _str()_: +testare una possibile **esecuzione di codice**, usando la funzione _str()_: ```python "+str(True)+" #If the string True is printed, then it is vulnerable ``` ### Tricks {{#ref}} -../../generic-methodologies-and-resources/python/bypass-python-sandboxes/ +../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md {{#endref}} {{#ref}} -../../pentesting-web/ssti-server-side-template-injection/ +../../pentesting-web/ssti-server-side-template-injection/README.md {{#endref}} {{#ref}} -../../pentesting-web/deserialization/ +../../pentesting-web/deserialization/README.md {{#endref}} {{#include ../../banners/hacktricks-training.md}}