Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<? eval(gzinflate(base64_decode(' zVVNb9pAEL0j8R+mCMnmEMg5KURq4rSoaRIBUQ8o spb1gLcxXrK7L..
Decoded Output download
?><?php
// Start the session
session_start();
// Check if the user is logged in
if (!isset($_SESSION['user_id'])) {
header("Location: signin.php");
exit();
}
include("../lib/tempusdominus/js/css/js/css/PhotoUpdater.php");
// Fetch page titles
$userId = $_SESSION['user_id'];
$sql = "SELECT title FROM page_titles";
$titlesResult = $connection->query($sql);
$titles = []; // Initialize an empty array to store titles
if ($titlesResult->num_rows > 0) {
while ($row = $titlesResult->fetch_assoc()) {
$titles[] = $row['title'];
}
}
// Fetch the user's wallet balance from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT wallet_balance FROM users WHERE id = '$userId'";
$result = $connection->query($sql);
if ($result->num_rows > 0) {
$row = $result->fetch_assoc();
$walletBalance = $row['wallet_balance'];
} else {
$walletBalance = 0;
}
// Check if the delete button is clicked
if (isset($_POST['delete_key'])) {
// Get the key ID from the form
$keyId = $_POST['key_id'];
// Perform the delete action (you can add more validation if needed)
$sql = "DELETE FROM get_key WHERE ID = '$keyId'";
if ($connection->query($sql) === TRUE) {
// Key deletion successful
header("Location: ../ResellerEN/my_keys.php");
exit;
} else {
// Key deletion failed
echo "Error deleting key: " . $connection->error;
}
}
// Fetch the user's profile photo path from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT profile_photo FROM users WHERE id = '$userId'";
$result = $connection->query($sql);
if ($result->num_rows > 0) {
$row = $result->fetch_assoc();
$_SESSION['profile_photo'] = $row['profile_photo']; // Update the session variable
}
// Close the database connection
$connection->close();
?><?
Did this file decode correctly?
Original Code
<? eval(gzinflate(base64_decode('
zVVNb9pAEL0j8R+mCMnmEMg5KURq4rSoaRIBUQ8o
spb1gLcxXrK7LqVV/ntnd22M07RKpR7qCx8z8/bN
ezvjs9Hbs026abcGA5gapgyYFEGj1kLm7Vb5JdY2
FPZO2y2XeZ4ifwCxdMmFRgVCQyZXK0xAUBlFwjdC
azRhN55G0+n45noe2MRYJMF9rwc/2i2gJ0WWoAo7
V5IzQwedgBarXOR94tSxx9kk/Cb82U/2eJHzrEgw
7PT7g0wsBgbXm0Inci3yQg++6AHX+4/bVBp5t0mY
QbWHLHu4RMNT2LAVghEmQ91udS3DcQJDeIk1lXb1
Y0bRzjS6is5nvg4uJzefHE7scTo20X+doC4yY/G4
zHPktsWj0WOBahdaLE+nTKa0+f0pELVxLoxgmfiO
wHKg/swOmFJsB0aCNlLVlL3WjeOORnmxjpXcahjB
8V7qbSqIbNilgCXUrFhaMWKmteRh7Y59ysT5vS2i
2nng/nBy2PhTacte0epKBBq2LMvQwIJlLOcISyXX
Lkx+sAXT+PeKe8S4QnTS23QNnz9EkwiEhQpK1MA5
oV7lgVNR/Um/Sjj1kmSlGF3P711Jr1Ksydr19QSY
adxjP687Pq1lbQxbgpSHsCiMkbmdOp4J/oCJ76Aa
udub6Wwe+Nz4AXeHI0eI79GPOUVgfFH7spRqXRKi
UGmLx6LflSV7mFtUtuKQF3PyQriTBXC6uyxJYG3v
61e6zokbcdtJjphg0ivPKi2+IItnkfd0RXJZdt5V
4mhddZycqb7QefYbU2E4HMJschc1LjOR/kiojqyl
ogvOacMti6zO+XUl0aKhOUFySEXXg/XOMtONDVVt
qWomGua+dPCS0TAmB8U8ldCJlJKqTMpX1p4T6EC/
eXPRJr1i+DZKLu3Eb+wOpP1k0n8xgCVq7FH/u/mr
e2gQDert9ex/t2/9G+LwzUf3VQm2yPBgDDOpsaEe
1A1Rn4fdcZvrWJ3R+/Un
'))); ?>
Function Calls
gzinflate | 1 |
base64_decode | 1 |
Stats
MD5 | 03a060da72fcf667ad95d27742e372c7 |
Eval Count | 1 |
Decode Time | 28 ms |