inhann
inhann
`test.md` : ````markdown # One ```python #!/bin/python print("hello world") ``` ## two hello world ### Three hello world # Test test ## Hello hi ```` type `./cli.js test.md --number `...
# 魔改增加功能: 1. 为 `hackRequests.http()` / `http()` 增加了个 `params` 参数,支持传入 dict 形式的 query string(像 requests 一样) 2. 为 `hackRequests.http()` / `http()` 增加了个 `timeout` 参数 ,这样写时间盲注之类的脚本的时候会方便一点 3. 增加了个 `encode_invalid_chars()` 函数,这样 url...
The option of deleting selected jobs , is unnecessary and useless .
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31279 # Laravel 9.1.8 POP chain3 Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in (1) `__destruct` in Illuminate\Broadcasting\PendingBroadcast.php .(2)...
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30778 ## Build a route to test: `routes/web.php` : ```php
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30779 ## build a route to test: `routes/web.php` : ```php
# Laravel 9.1.8 POP chain4 Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in (1) `__destruct` in Illuminate\Routing\PendingResourceRegistration.php .(2) `register` in...
