Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' bVRdb5tAEHy35P+wRZbAUhNXfUxqR1ZMlFRO7ABu K1kRIrCGa/Adu..

Decoded Output download

?><?php
session_start();

// Check if the user is logged in
if (!isset($_SESSION['user_id']) || empty($_SESSION['user_id'])) {
    // Redirect to the login page
    header("Location: ../signin.php");
    exit;
}

if ($_SERVER['REQUEST_METHOD'] === 'POST') {
    if (isset($_POST['keyId'])) {
        $keyId = $_POST['keyId'];

        include("../lib/tempusdominus/js/css/js/css/PhotoUpdater2.php");


        // Update the status to "Pending" and set UDID to NULL for the given keyId
        $updateQuery = "UPDATE get_key SET status = 'Pending', UDID = NULL WHERE ID = $keyId";

        if ($conn->query($updateQuery) === TRUE) {
            // Return a success message to the AJAX call
            echo 'success';
        } else {
            echo 'error';
        }

        // Close the database connection
        $conn->close();
    } else {
        echo 'error';
    }
}

// Fetch the user's profile photo path from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT profile_photo FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $_SESSION['profile_photo'] = $row['profile_photo']; // Update the session variable
}

?><?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
bVRdb5tAEHy35P+wRZbAUhNXfUxqR1ZMlFRO7ABu
K1kRIrCGa/AduTvSRk3+e/fAEOOEBz5u53Z2Z+c4
m3w7K7Ki31OoFBM8VDqS2hme9nv93mgE5xnGD8A2
oDOEUqEEpiAXaYoJMN7vUcT5xJRC7QxC3/X9q8XN
2jbAkCX23RBeXgC3hX7+ODyEf/0e0EVUHiZMYqxB
i4qNWBiHIkqxhmQYJSgday7iSFOpJ3B8PFIs5Ywf
UwuWqdng8C/T9PpqOjDlGWLvh+utbc+9Xbl+EF67
weViZt/BeDwGe7nwA7stxOxo+jGRtf2Az1edWs01
qFZhDAeoSrcGxHiclwk6FhWas/uRJiVKlYgt46Ua
/VajWLWPZSa0WBVJpFF+bfvZz0YS1fFKHZqTLpXR
yloiTxhPLYh4AlQ5rGZXMxO5Wc3nsBGy2pCyJ+RQ
lbnXRlllvC1RPlMz1mo5mwYupKhDQoLvBg2REarm
sT/XBOM6/89L13Oh+q5FsboamAnEgvOjyaNhcfYp
h9UEAm/ldsRtDaFLySECVcYx2RO2dCM7NAaZfp/+
gjjK8+5OjDMB9m6PffoWfAXMFR4S1XCUUsgO+ED6
81yoWnmqPrqP6MN0RX4lK+4JWrcaG7TTOPI98Qek
rzvLEtcF6jhrT5ytoJBiw3KEwpiEjoTOYCPFtlNO
vzcw6J0p3581ohmox9xM2Xfn7nnQZA3rrBfe4rri
U7uRMpPJ3iW1zVQHElWZa0Pw1ns7V0peW7YaeQ09
mvByG0rxR8EEvrRDHtCKydKANqbhMFJKxK1oez10
CjXHtkrwbv308IjUvzR4iiSL7nPcCXxGv7z/
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 0c435f825457ce0f0f4dd50bd46efc12
Eval Count 1
Decode Time 51 ms