Translated ['src/generic-methodologies-and-resources/python/README.md',

This commit is contained in:
Translator 2025-08-19 21:31:24 +00:00
parent eea10ced97
commit ab914c2490
2 changed files with 8 additions and 8 deletions

View File

@ -2,11 +2,11 @@
{{#include ../../banners/hacktricks-training.md}}
**值得查看的有趣页面:**
**值得查看的页面:**
- [**Pyscript 黑客技巧**](pyscript.md)
- [**Python 反序列化**](../../pentesting-web/deserialization/index.html#python)
- [**绕过 Python 沙箱的技巧**](bypass-python-sandboxes/index.html)
- [**Python 反序列化**](../../pentesting-web/deserialization/README.md)
- [**绕过 Python 沙箱的技巧**](bypass-python-sandboxes/README.md)
- [**基本的 Python 网络请求语法**](web-requests.md)
- [**基本的 Python 语法和库**](basic-python.md)

View File

@ -4,22 +4,22 @@
## 使用 Python 的服务器
测试可能的 **代码执行**,使用函数 _str()_:
测试可能的 **code execution**,使用函数 _str()_:
```python
"+str(True)+" #If the string True is printed, then it is vulnerable
```
### 技巧
### Tricks
{{#ref}}
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/
../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/ssti-server-side-template-injection/
../../pentesting-web/ssti-server-side-template-injection/README.md
{{#endref}}
{{#ref}}
../../pentesting-web/deserialization/
../../pentesting-web/deserialization/README.md
{{#endref}}
{{#include ../../banners/hacktricks-training.md}}