From 3446e2bbc5d19e1272ee8f47179701e26023b2ad Mon Sep 17 00:00:00 2001 From: Arian Date: Wed, 4 Sep 2024 12:10:36 -0700 Subject: [PATCH] Correct "CheatSheet" spelling --- SUMMARY.md | 2 +- pentesting-web/sql-injection/README.md | 2 +- pentesting-web/sql-injection/sqlmap/README.md | 2 +- pentesting-web/web-tool-wfuzz.md | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/SUMMARY.md b/SUMMARY.md index da21c1b58..33ae4e36e 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -630,7 +630,7 @@ * [Big Binary Files Upload (PostgreSQL)](pentesting-web/sql-injection/postgresql-injection/big-binary-files-upload-postgresql.md) * [RCE with PostgreSQL Languages](pentesting-web/sql-injection/postgresql-injection/rce-with-postgresql-languages.md) * [RCE with PostgreSQL Extensions](pentesting-web/sql-injection/postgresql-injection/rce-with-postgresql-extensions.md) - * [SQLMap - Cheetsheat](pentesting-web/sql-injection/sqlmap/README.md) + * [SQLMap - CheatSheet](pentesting-web/sql-injection/sqlmap/README.md) * [Second Order Injection - SQLMap](pentesting-web/sql-injection/sqlmap/second-order-injection-sqlmap.md) * [SSRF (Server Side Request Forgery)](pentesting-web/ssrf-server-side-request-forgery/README.md) * [URL Format Bypass](pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md) diff --git a/pentesting-web/sql-injection/README.md b/pentesting-web/sql-injection/README.md index 18e27f155..d6c6b41f2 100644 --- a/pentesting-web/sql-injection/README.md +++ b/pentesting-web/sql-injection/README.md @@ -289,7 +289,7 @@ a' UNION SELECT EXTRACTVALUE(xmltype('[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ diff --git a/pentesting-web/web-tool-wfuzz.md b/pentesting-web/web-tool-wfuzz.md index 5008fb5c0..7e860b0b9 100644 --- a/pentesting-web/web-tool-wfuzz.md +++ b/pentesting-web/web-tool-wfuzz.md @@ -67,7 +67,7 @@ Examples: -z list,each-element-here,hexlify #Inline list and to hex before sending values ``` -## CheetSheet +## CheatSheet ### Login Form bruteforce