woven/trojan/<?php echo AttrEscape($pl); ?> /<?php echo $pl; ?> .repack.html">woven</a> <?php $obfus = $plnode->getElementsByTagName('obfuscation'); for ($j = 0; $j < $obfus->length; $j++) { $obnode = $obfus->item($j); $ob = $obnode->getAttribute('name'); ?> | <a href="<?php echo TGTROOT; ?> trojan/app?payload=<?php echo AttrEscape(urlencode($pl)); ?> &obfu=<?php echo AttrEscape(urlencode($ob)); ?> "><?php echo XMLEncode($ob); ?> </a> <?php } } $links = array('attack' => TGTROOT . "trojan/app"); include INCDIR . 'footer.php';
$loggedin = false; $logout = LoadParam('logout', $_REQUEST); if ($logout !== null) { unset($_SESSION['user']); unset($_SESSION['username']); unset($_SESSION['admin']); $errors[] = "Logged out"; } else { if (isset($_SESSION['user'])) { $loggedin = true; $errors[] = "Logged in as " . $_SESSION['username']; } } ?> <h1><?php echo isset($logintitle) ? XMLEncode($logintitle) : "Target Server Login"; ?> </h1> <?php if (sizeof($errors) > 0) { ?> <p id="error"> <?php echo implode('<br/>', $errors); ?> </p> <?php } if ($loggedin) { ?> <form name="logout" method="post" action="<?php