Skip to content

Commit cd60902

Browse files
committed
f
1 parent 484f03c commit cd60902

File tree

14 files changed

+15
-3
lines changed

14 files changed

+15
-3
lines changed

.github/workflows/translate_all.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ jobs:
106106
fi
107107
done
108108
109-
echo "Files to translate:"
109+
echo "Files to translate (`wc -l < /tmp/file_paths.txt`):"
110110
cat /tmp/file_paths.txt
111111
echo ""
112112
echo ""

src/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -253,3 +253,4 @@ welcome/hacktricks-values-and-faq.md
253253

254254
{{#include ./banners/hacktricks-training.md}}
255255

256+

src/SUMMARY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -950,4 +950,4 @@
950950
- [Stealing Sensitive Information Disclosure from a Web](todo/stealing-sensitive-information-disclosure-from-a-web.md)
951951
- [Post Exploitation](todo/post-exploitation.md)
952952
- [Investment Terms](todo/investment-terms.md)
953-
- [Cookies Policy](todo/cookies-policy.md)
953+
- [Cookies Policy](todo/cookies-policy.md)

src/blockchain/smart-contract-security/mutation-testing-with-slither.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,3 +124,4 @@ Guidance: Treat survivors that affect value transfers, accounting, or access con
124124
- [Slither (GitHub)](https://github.com/crytic/slither)
125125

126126
{{#include ../../banners/hacktricks-training.md}}
127+

src/linux-hardening/privilege-escalation/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1787,3 +1787,4 @@ vmware-tools-service-discovery-untrusted-search-path-cve-2025-41244.md
17871787
- [NVISO – You name it, VMware elevates it (CVE-2025-41244)](https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/)
17881788
17891789
{{#include ../../banners/hacktricks-training.md}}
1790+

src/linux-hardening/privilege-escalation/socket-command-injection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,3 +86,4 @@ Notes:
8686

8787

8888

89+

src/linux-hardening/privilege-escalation/vmware-tools-service-discovery-untrusted-search-path-cve-2025-41244.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,4 +150,4 @@ esac
150150
- [MITRE ATT&CK T1036.005 – Match Legitimate Name or Location](https://attack.mitre.org/techniques/T1036/005/)
151151
- [CWE-426: Untrusted Search Path](https://cwe.mitre.org/data/definitions/426.html)
152152

153-
{{#include ../../banners/hacktricks-training.md}}
153+
{{#include ../../banners/hacktricks-training.md}}

src/network-services-pentesting/pentesting-web/ruby-tricks.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,3 +176,4 @@ URL-encoded PoC (first char is a newline):
176176
- [How Ruby load works](https://blog.appsignal.com/2023/04/19/how-to-load-code-in-ruby.html)
177177

178178
{{#include ../../banners/hacktricks-training.md}}
179+

src/network-services-pentesting/pentesting-web/vmware-esx-vcenter....md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,3 +33,5 @@ Linux LPE via VMware Tools service discovery (CWE-426 / CVE-2025-41244):
3333

3434

3535

36+
37+

src/pentesting-web/file-inclusion/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -761,3 +761,4 @@ EN-Local-File-Inclusion-1.pdf
761761
{{#endfile}}
762762

763763
{{#include ../../banners/hacktricks-training.md}}
764+

0 commit comments

Comments
 (0)