Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php $TAB = "FIREWALL"; // Main include include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.p..

Decoded Output download

<?php
$TAB = "FIREWALL";

// Main include
include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";

// Check user
if ($_SESSION["userContext"] != "admin") {
	header("Location: /list/user");
	exit();
}

// Data
exec(HESTIA_CMD . "v-list-firewall-ipset json", $output, $return_var);
$data = json_decode(implode("", $output), true);
ksort($data);

// Render page
render_page($user, $TAB, "list_firewall_ipset");

// Back uri
$_SESSION["back"] = $_SERVER["REQUEST_URI"];
 ?>

Did this file decode correctly?

Original Code

<?php
$TAB = "FIREWALL";

// Main include
include $_SERVER["DOCUMENT_ROOT"] . "/inc/main.php";

// Check user
if ($_SESSION["userContext"] != "admin") {
	header("Location: /list/user");
	exit();
}

// Data
exec(HESTIA_CMD . "v-list-firewall-ipset json", $output, $return_var);
$data = json_decode(implode("", $output), true);
ksort($data);

// Render page
render_page($user, $TAB, "list_firewall_ipset");

// Back uri
$_SESSION["back"] = $_SERVER["REQUEST_URI"];

Function Calls

None

Variables

$TAB FIREWALL

Stats

MD5 0672f032612c0bc1953463a5e0e33e00
Eval Count 0
Decode Time 98 ms