diff --git a/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg b/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg
new file mode 100644
index 000000000..dae1ef8c6
Binary files /dev/null and b/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg differ
diff --git a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
index 4e00af3a9..a910c3341 100644
--- a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
+++ b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
@@ -14,6 +14,14 @@ Other ways to support HackTricks:
+**Try Hard Security Group**
+
+
+
+{% embed url="https://discord.gg/tryhardsecurity" %}
+
+***
+
## Formula Injection
### Info
@@ -209,6 +217,12 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130)
* [https://salmonsec.com/cheatsheet/latex\_injection](https://salmonsec.com/cheatsheet/latex\_injection)
* [https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/](https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/)
+**Try Hard Security Group**
+
+
+
+{% embed url="https://discord.gg/tryhardsecurity" %}
+
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!