File tree Expand file tree Collapse file tree 3 files changed +14
-3
lines changed
Expand file tree Collapse file tree 3 files changed +14
-3
lines changed Original file line number Diff line number Diff line change 1010 <div id="head">
1111 <a href="<?php echo APP_URL_ROOT ;?> /"><img src="<?php echo APP_URL_ROOT ;?> /img/logo.png"/></a>
1212 <div id="head_menu">
13- <a href="javascript:show_code()">查看源码 </a>
13+ <a id="handle_code" href="javascript:show_code()">显示源码 </a>
1414 <a href="javascript:get_prompt()">查看提示</a>
1515 <a href="javascript:clean_upload_file()">清空上传文件</a>
1616 </div>
Original file line number Diff line number Diff line change 1313 <ol>
1414 <li>
1515 <h3>简介</h3>
16- <p><code>upload-labs</code>是一个使用<code>php</code>语言编写的,专门收集渗透测试过程中遇到的各种上传漏洞的靶场 。旨在帮助大家对上传漏洞有一个全面的了解。目前一共19关 ,每一关都包含着不同上传方式。</p>
16+ <p><code>upload-labs</code>是一个使用<code>php</code>语言编写的,专门收集渗透测试和CTF中遇到的各种上传漏洞的靶场 。旨在帮助大家对上传漏洞有一个全面的了解。目前一共20关 ,每一关都包含着不同上传方式。</p>
1717 </li>
1818 <li>
1919 <h3>注意</h3>
Original file line number Diff line number Diff line change @@ -9,7 +9,7 @@ function show_code(){
99 if ( url . indexOf ( "?" ) != - 1 ) {
1010 url = url . split ( "?" ) [ 0 ] ;
1111 }
12-
12+
1313 var e = document . getElementById ( "show_code" ) ;
1414 if ( e == null ) {
1515 window . location . href = url + "?action=show_code" ;
@@ -18,6 +18,16 @@ function show_code(){
1818 }
1919}
2020
21+ function modify_showcode_name ( ) {
22+ var url = window . location . href ;
23+ var btn_showcode = document . getElementById ( "handle_code" ) ;
24+ if ( url . indexOf ( 'show_code' ) >= 0 ) {
25+ btn_showcode . innerHTML = "隐藏源码" ;
26+ } else {
27+ btn_showcode . innerHTML = "显示源码" ;
28+ }
29+ }
30+
2131function get_prompt ( ) {
2232 $ . ajax ( {
2333 type : 'get' ,
@@ -66,6 +76,7 @@ var Dialog = {
6676}
6777
6878$ ( function ( ) {
79+ modify_showcode_name ( ) ;
6980 //设置footer用于在底部
7081 setFooter ( ) ;
7182 window . onresize = function ( ) {
You can’t perform that action at this time.
0 commit comments