File tree 3 files changed +14
-3
lines changed
3 files changed +14
-3
lines changed Original file line number Diff line number Diff line change 10
10
<div id="head">
11
11
<a href="<?php echo APP_URL_ROOT ;?> /"><img src="<?php echo APP_URL_ROOT ;?> /img/logo.png"/></a>
12
12
<div id="head_menu">
13
- <a href="javascript:show_code()">查看源码 </a>
13
+ <a id="handle_code" href="javascript:show_code()">显示源码 </a>
14
14
<a href="javascript:get_prompt()">查看提示</a>
15
15
<a href="javascript:clean_upload_file()">清空上传文件</a>
16
16
</div>
Original file line number Diff line number Diff line change 13
13
<ol>
14
14
<li>
15
15
<h3>简介</h3>
16
- <p><code>upload-labs</code>是一个使用<code>php</code>语言编写的,专门收集渗透测试过程中遇到的各种上传漏洞的靶场 。旨在帮助大家对上传漏洞有一个全面的了解。目前一共19关 ,每一关都包含着不同上传方式。</p>
16
+ <p><code>upload-labs</code>是一个使用<code>php</code>语言编写的,专门收集渗透测试和CTF中遇到的各种上传漏洞的靶场 。旨在帮助大家对上传漏洞有一个全面的了解。目前一共20关 ,每一关都包含着不同上传方式。</p>
17
17
</li>
18
18
<li>
19
19
<h3>注意</h3>
Original file line number Diff line number Diff line change @@ -9,7 +9,7 @@ function show_code(){
9
9
if ( url . indexOf ( "?" ) != - 1 ) {
10
10
url = url . split ( "?" ) [ 0 ] ;
11
11
}
12
-
12
+
13
13
var e = document . getElementById ( "show_code" ) ;
14
14
if ( e == null ) {
15
15
window . location . href = url + "?action=show_code" ;
@@ -18,6 +18,16 @@ function show_code(){
18
18
}
19
19
}
20
20
21
+ function modify_showcode_name ( ) {
22
+ var url = window . location . href ;
23
+ var btn_showcode = document . getElementById ( "handle_code" ) ;
24
+ if ( url . indexOf ( 'show_code' ) >= 0 ) {
25
+ btn_showcode . innerHTML = "隐藏源码" ;
26
+ } else {
27
+ btn_showcode . innerHTML = "显示源码" ;
28
+ }
29
+ }
30
+
21
31
function get_prompt ( ) {
22
32
$ . ajax ( {
23
33
type : 'get' ,
@@ -66,6 +76,7 @@ var Dialog = {
66
76
}
67
77
68
78
$ ( function ( ) {
79
+ modify_showcode_name ( ) ;
69
80
//设置footer用于在底部
70
81
setFooter ( ) ;
71
82
window . onresize = function ( ) {
You can’t perform that action at this time.
0 commit comments