•  


GitHub - bit4woo/python_sec: python安全和代???相??料收集 resource collection of python security and code review
Skip to content

bit4woo/python_sec

Folders and files

Name Name
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

代?注入、命令?行

1.?置危?函?
exec
execfile
eval

2.?准?危?模?
os
subprocess
commands

3.危?第三方?
Template(user_input) : 模板注入(SSTI)所?生的代??行
subprocess32 

4.反序列化
marshal
PyYAML
pickle和cpickle
shelve
PIL
unzip

Python沙箱逃逸的n?姿?

禁用import的情?下??python沙箱

Escaping the Python Sandbox

Python Sandbox Bypass

Python之?据序列化(json、pickle、shelve)

Exploiting Python PIL Module Command Execution Vulnerability

Exploiting Python Code Injection in Web Applications

EXPLOITING PYTHON CODE INJECTION IN WEB APPLICATIONS

Python eval的常???封?及利用原理

Exploiting Python’s Eval

Exploiting insecure file extraction in Python for code execution

掌?iReader某站Python漏洞?掘

Python Pickle的任意代??行漏洞??和Payload?造

django的secret key泄漏?致的命令?行??

Remote Code Execution on a Facebook server

Python PyYAML反序列化漏洞??和payload?造

Exploiting Python Deserialization Vulnerabilities

Shellcoding in Python’s serialisation format

PyCodeInjection代?注入???境

Exploiting Python Code Injection in Web Applications ??版

Numpy反序列化命令?行(CVE-2019-6446)?析

代???

Python安全??和代???

Python代?????之一:CSRF https://www.cdxy.me/?p=736

Python代?????之二:SSTI https://www.cdxy.me/?p=738

Python代?????之三:Server Side Request https://www.cdxy.me/?p=744

Python代?????之四:Command Execution https://www.cdxy.me/?p=747

Dangerous Python Functions, Part 1

Dangerous Python Functions, Part 2

Dangerous Python Functions, Part 3

?一下PythonWeb代?????注意的地方

廖新喜大?的python代???工具

?自openstack安全??的python代?????工具

?自openstack安全??的python代?????工具2

代???工具pyt

xfkxfk的python自?化代??? 基于 pyekaboo 和廖新喜的 pyvulhunter

Django相?

Django debug page XSS漏洞(CVE-2017-12794)分析

Django DeleteView without confirmation template, but with CSRF attack

Django安全机制

?Django的SECTET_KEY到代??行

Django CSRF Bypass (CVE-2016-7401) 漏洞分析

Django CSRF Bypass 漏洞分析(CVE-2016-7401)

Django的??url跳?漏洞分析:CVE-2017-7233&7234

Python 格式化字符串漏洞(Django?例) https://xz.aliyun.com/t/288

Django 安全最佳??

?Pwnhub?生聊Django安全??

python和django的目?遍?漏洞(任意文件?取)

新型任意文件?取漏洞的?究

django的一些安全??答案

Django JSONField SQL注入漏洞(CVE-2019-14234)分析?影?

package??

Package ??

被忽?的攻?面:Python package ??

https://www.pytosquatting.org/

PyPI 官方??遭遇request?意包投毒

LDAP注入

Python安全??之?防LDAP注入

SSRF

?一?如何在Python??中拒?SSRF漏洞

Python安全 - ?SSRF到命令?行?案

Splash SSRF 到?取??服?器 ROOT ?限

XSS

Flask Debugger?面上的通用XSS漏洞分析和?掘?程??

SQLI

??PythonWeb??中可能?遇到的安全??之SQL注入

Django JSONField SQL注入漏洞(CVE-2019-14234)分析?影?

SSTI模版注入

Python Security Auditing (II): SSTI

exploring-ssti-in-flask-jinja2

exploring-ssti-in-flask-jinja2-part-ii

python webshell

https://github.com/evilcos/python-webshell

https://github.com/ahhh/Reverse_DNS_Shell

paper

Python_Hack_知道?宇_北北(?博).pdf

其他

如何判?目?站点是否?Django??

Supervisord?程命令?行漏洞(CVE-2017-11610)

python富文本XSS??器

基于mezzanine的攻防比??境搭建及XXE漏洞?造/

Python Waf黑名???下的一些Bypass思路

Pwnhub Web?Classroom?解?分析

Programming Secure Web Applications in Python

[CVE-2016-5699] HTTP Header Injection in Python urllib http://www.anquan.us/static/drops/papers-16905.html

[CVE-2019-9740] Python urllib CRLF injection vulnerability https://xz.aliyun.com/t/5123

Hack Redis via Python urllib HTTP Header Injection

【技?分享】python web 安全??

安全工具

python正向?接后?

struts2 S2-016/S2-017 Python GetShell

Python多?程端口?描工具

Python JSON Fuzzer: PyJFuzz

https://github.com/smartFlash/pySecurity

?象注入、底?安全

DEFENCELY CLARIFIES PYTHON OBJECT INJECTION EXPLOITATION

OWASP Python Security Project

Escaping a Python sandbox with a memory corruption bug

About

python安全和代???相??料收集 resource collection of python security and code review

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
- "漢字路" 한글한자자동변환 서비스는 교육부 고전문헌국역지원사업의 지원으로 구축되었습니다.
- "漢字路" 한글한자자동변환 서비스는 전통문화연구회 "울산대학교한국어처리연구실 옥철영(IT융합전공)교수팀"에서 개발한 한글한자자동변환기를 바탕하여 지속적으로 공동 연구 개발하고 있는 서비스입니다.
- 현재 고유명사(인명, 지명등)을 비롯한 여러 변환오류가 있으며 이를 해결하고자 많은 연구 개발을 진행하고자 하고 있습니다. 이를 인지하시고 다른 곳에서 인용시 한자 변환 결과를 한번 더 검토하시고 사용해 주시기 바랍니다.
- 변환오류 및 건의,문의사항은 juntong@juntong.or.kr로 메일로 보내주시면 감사하겠습니다. .
Copyright ⓒ 2020 By '전통문화연구회(傳統文化硏究會)' All Rights reserved.
 한국   대만   중국   일본