mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-19 15:10:24 -04:00
growing up
This commit is contained in:
parent
ef5077cd50
commit
9bb02f2ddf
25 changed files with 47 additions and 50 deletions
|
@ -62,8 +62,8 @@ If you think about it, a Stack is the perfect object for a process: the process
|
|||
|
||||
|
||||
|
||||
[Python & Algorithms]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf
|
||||
[here are some examples]: https://github.com/bt3gl/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks
|
||||
[Python & Algorithms]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/blob/master/book/book_second_edition.pdf
|
||||
[here are some examples]: https://github.com/go-outside-labs/Python-and-Algorithms-and-Data-Structures/tree/master/src/abstract_structures/Stacks
|
||||
|
||||
|
||||
|
||||
|
@ -171,7 +171,7 @@ EGG=0X41414141
|
|||
|
||||
To understand more about environments variables in exploits, take a look into my [Shellshock guide].
|
||||
|
||||
[Shellshock guide]: http://bt3gl.github.io/understanding-the-shellshock-vulnerability.html
|
||||
[Shellshock guide]: http://https://singularity-sh.vercel.app/understanding-the-shellshock-vulnerability.html
|
||||
|
||||
|
||||
#### Shell Commands
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue