translate 2

This commit is contained in:
Carlos Polop
2025-01-01 21:36:26 +01:00
parent d0b9174054
commit 2beb8398a6
250 changed files with 0 additions and 256 deletions

View File

@@ -177,4 +177,3 @@ If they are used for example inside a a bash command, you could perform a comman

View File

@@ -113,4 +113,3 @@ AUTH_ROLE_PUBLIC = 'Admin'

View File

@@ -45,4 +45,3 @@ These are the default permissions per default role:

View File

@@ -390,4 +390,3 @@ You can also pass these as environment variables `ATLANTIS_WEB_BASIC_AUTH=true`

View File

@@ -257,4 +257,3 @@ jobs:

View File

@@ -136,4 +136,3 @@ cloudflare-zero-trust-network.md

View File

@@ -35,4 +35,3 @@ concourse-enumeration-and-attacks.md

View File

@@ -40,4 +40,3 @@ In order to execute tasks concourse must have some workers. These workers **regi

View File

@@ -444,4 +444,3 @@ Accept-Encoding: gzip.

View File

@@ -153,4 +153,3 @@ Check a YAML pipeline example that triggers on new commits to master in [https:/

View File

@@ -140,4 +140,3 @@ If you are inside the server you can also **use the `gitea` binary** to access/m

View File

@@ -105,4 +105,3 @@ Different protections can be applied to a branch (like to master):

View File

@@ -246,4 +246,3 @@ For more info check [https://www.chainguard.dev/unchained/what-the-fork-imposter

View File

@@ -583,4 +583,3 @@ The following tools are useful to find Github Action workflows and even find vul

View File

@@ -58,4 +58,3 @@ And the latest one use a short sha-1 that is bruteforceable.

View File

@@ -257,4 +257,3 @@ Different protections can be applied to a branch (like to master):

View File

@@ -414,4 +414,3 @@ println(hudson.util.Secret.decrypt("{...}"))

View File

@@ -96,4 +96,3 @@ According to [**the docs**](https://www.jenkins.io/blog/2019/02/21/credentials-m

View File

@@ -107,4 +107,3 @@ The example curl command provided demonstrates how to make a request to Jenkins

View File

@@ -91,4 +91,3 @@ for (c in creds) {

View File

@@ -41,4 +41,3 @@ If you can access the configuration file of some pipeline configured you could j

View File

@@ -38,4 +38,3 @@ If you are not executing a reverse shell but a simple command you can **see the

View File

@@ -65,4 +65,3 @@ msf> use exploit/multi/http/jenkins_script_console

View File

@@ -116,4 +116,3 @@ okta-hardening.md

View File

@@ -201,4 +201,3 @@ Here you can download Okta agents to sync Okta with other technologies.

View File

@@ -106,4 +106,3 @@ Check this interesting article about the top 10 CI/CD risks according to Cider:

View File

@@ -860,4 +860,3 @@ Granting excessive permissions to team members and external collaborators can le

View File

@@ -165,4 +165,3 @@ It's possible to **store secrets** in supabase also which will be **accessible b

View File

@@ -314,4 +314,3 @@ brew install terrascan

View File

@@ -18,4 +18,3 @@ Github PRs are welcome explaining how to (ab)use those platforms from an attacke

View File

@@ -67,4 +67,3 @@ If an attacker ends in an environment which uses **TravisCI enterprise** (more i

View File

@@ -94,4 +94,3 @@ The amount of deployed TCI Worker and build environment OS images will determine

View File

@@ -439,4 +439,3 @@ An **Access Group** in Vercel is a collection of projects and team members with