diff --git a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md
index 7b7610489..d9c79c2b2 100644
--- a/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md
+++ b/network-services-pentesting/8009-pentesting-apache-jserv-protocol-ajp.md
@@ -143,7 +143,6 @@ Stay informed with the newest bug bounties launching and crucial platform update
Learn & practice AWS Hacking:
[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)
\
Learn & practice GCP Hacking:
[**HackTricks Training GCP Red Team Expert (GRTE)**
](https://training.hacktricks.xyz/courses/grte)
-
Support HackTricks
diff --git a/network-services-pentesting/8089-splunkd.md b/network-services-pentesting/8089-splunkd.md
index fd6f6ec94..f42f6d0f1 100644
--- a/network-services-pentesting/8089-splunkd.md
+++ b/network-services-pentesting/8089-splunkd.md
@@ -15,7 +15,6 @@ Learn & practice GCP Hacking:
{% endhint %}
-
## **Basic Information**
* Log analytics tool used for data gathering, analysis, and visualization
@@ -148,4 +147,4 @@ Learn & practice GCP Hacking:
-{% endhint %}
+{% endhint %}
\ No newline at end of file
diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md
index 9f4da2606..a33d01c63 100644
--- a/network-services-pentesting/pentesting-pop.md
+++ b/network-services-pentesting/pentesting-pop.md
@@ -98,7 +98,6 @@ root@kali:~# telnet $ip 110
POP servers with the setting **`auth_debug`** enabled will be increasing the logs generated. However, if **`auth_debug_passwords`** or **`auth_verbose_passwords`** are set as **`true`**, password could be also logged in clear text in those logs.
-
## HackTricks Automatic Commands
```
@@ -155,4 +154,4 @@ Learn & practice GCP Hacking:
-{% endhint %}
+{% endhint %}
\ No newline at end of file
diff --git a/network-services-pentesting/pentesting-web/drupal/README.md b/network-services-pentesting/pentesting-web/drupal/README.md
index 21711800c..8711cbe90 100644
--- a/network-services-pentesting/pentesting-web/drupal/README.md
+++ b/network-services-pentesting/pentesting-web/drupal/README.md
@@ -125,7 +125,6 @@ mysql -u drupaluser --password='2r9u8hu23t532erew' -e 'use drupal; select * from
Learn & practice AWS Hacking:
[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)
\
Learn & practice GCP Hacking:
[**HackTricks Training GCP Red Team Expert (GRTE)**
](https://training.hacktricks.xyz/courses/grte)
-
Support HackTricks
@@ -135,4 +134,4 @@ Learn & practice GCP Hacking:
[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)
\
Learn & practice GCP Hacking:
[**HackTricks Training GCP Red Team Expert (GRTE)**
](https://training.hacktricks.xyz/courses/grte)
+
Support HackTricks
diff --git a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
index a2feee0f4..e42c57d30 100644
--- a/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
+++ b/pentesting-web/server-side-inclusion-edge-side-inclusion-injection.md
@@ -250,7 +250,6 @@ Check the XSLT page:
[xslt-server-side-injection-extensible-stylesheet-language-transformations.md](xslt-server-side-injection-extensible-stylesheet-language-transformations.md)
{% endcontent-ref %}
-
### References
* [https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/](https://www.gosecure.net/blog/2018/04/03/beyond-xss-edge-side-include-injection/)
@@ -274,4 +273,4 @@ Learn & practice GCP Hacking:
-{% endhint %}
+{% endhint %}
\ No newline at end of file