Web Security Learning
stable

Content Index:

  • 1. Prologue
  • 2. Computer Networks and Protocols
  • 3. Information Collection
  • 4. Common vulnerability attack and defense
  • 5. Language and Framework
    • 5.1. PHP
    • 5.2. Python
      • 5.2.1. Formatting Strings
      • 5.2.2. Deserialization
      • 5.2.3. Sandbox
      • 5.2.4. Framework
      • 5.2.5. Code Obfuscation
      • 5.2.6. Sink
      • 5.2.7. Reference Links
        • 5.2.7.1. Deserialization
        • 5.2.7.2. Sandbox
        • 5.2.7.3. Format strings
        • 5.2.7.4. Synthesis
    • 5.3. Java
    • 5.4. JavaScript
    • 5.5. Golang
    • 5.6. Ruby
    • 5.7. ASP
    • 5.8. PowerShell
    • 5.9. Shell
    • 5.10. CSharp
  • 6. Intranet penetration
  • 7. Cloud Security
  • 8. Defense Technology
  • 9. Authentication Mechanism
  • 10. Tools and Resources
  • 11. Manual Quick Check
  • 12. Others
Web Security Learning
  • »
  • 5. Language and Framework »
  • 5.2. Python »
  • 5.2.7. Reference Links

5.2.7. Reference Links¶

5.2.7.1. Deserialization¶

  • Python pickle deserialization

  • Official Python Sandbox wiki

  • Common error encapsulation and utilization principle of Python eval

  • pickle Python object serialization

  • Sour Pickles A serialised exploitation guide in one part

  • How pickle works in Python

5.2.7.2. Sandbox¶

  • General bypass of Python sandbox

  • An article to understand Python sandbox escape

5.2.7.3. Format strings¶

  • Python String Formatting Vulnerability

  • Be Careful with Python’s New-Style String Format

5.2.7.4. Synthesis¶

  • python security

  • Data collection related to Python security and code auditing

Previous Next

© Copyright 2019-2022, WebSecurity.

Built with Sphinx using a theme provided by Read the Docs.