diff --git a/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg b/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg new file mode 100644 index 000000000..dae1ef8c6 Binary files /dev/null and b/.gitbook/assets/telegram-cloud-document-1-5159108904864449420.jpg differ diff --git a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md index 4e00af3a9..a910c3341 100644 --- a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md +++ b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md @@ -14,6 +14,14 @@ Other ways to support HackTricks: +**Try Hard Security Group** + +
+ +{% embed url="https://discord.gg/tryhardsecurity" %} + +*** + ## Formula Injection ### Info @@ -209,6 +217,12 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130) * [https://salmonsec.com/cheatsheet/latex\_injection](https://salmonsec.com/cheatsheet/latex\_injection) * [https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/](https://scumjr.github.io/2016/11/28/pwning-coworkers-thanks-to-latex/) +**Try Hard Security Group** + +
+ +{% embed url="https://discord.gg/tryhardsecurity" %} +
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!