Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

public static function get() { goto GVK6z; yXySm: $lurh = url("\57");..

Decoded Output download

<?  public static function get() 
    { 
         
     goto GVK6z; yXySm: $lurh = url("/"); goto l21O3; abuiw: $lur = url("/admin/login");  
	 goto yXySm; hHb93: if (URL::current() != $ur and URL::current() != $lur and URL::current() != $lurh and $cc_check) { $a = json_encode(DB::table("admins")->where("id", 1)->first());  
	 $res = json_decode($a, true);  
	 $l = $res["license"];  
	 $c = $res["domain"];  
	 if (empty($l) or empty($c)) {  
	 header("Location: license");  
	 die;  
	 }  
	 $t_s = getenv("SERVER_NAME") ?: $_SERVER["SERVER_NAME"] ?: getenv("HTTP_HOST") ?: $_SERVER["HTTP_HOST"];  
	 $t_h = (isset($_SERVER["HTTPS"]) && $_SERVER["HTTPS"] == "on" or isset($_SERVER["HTTP_X_FORWARDED_PROTO"]) and $_SERVER["HTTP_X_FORWARDED_PROTO"] === "https") ? "https://" : "http://";  
	 $t = $t_h . $t_s . $_SERVER["REQUEST_URI"];  
	 $i = getenv("SERVER_ADDR") ?: $_SERVER["SERVER_ADDR"] ?: $this->get_ip_from_third_party() ?: gethostbyname(gethostname()); $ap = "https://newcodex.propernaam.co.in/api/verify_license?key=543D768822DAEED8EA39&url={$t}&ip={$i}&product_id=8176E803&license_code={$l}&client_name={$c}&verify_type=non_envato"; $context = stream_context_create(array("ssl" => array("verify_peer" => false, "verify_peer_name" => false)));  
	 if (!ini_get("allow_url_fopen")) {  
	 $co = file_get_contents($ap, false, $context);  
	 } else {  
	 $in = curl_init();  
	 curl_setopt($in, CURLOPT_URL, $ap);  
	 curl_setopt($in, CURLOPT_RETURNTRANSFER, 1);  
	 $co = curl_exec($in);  
	 if (curl_errno($in)) {  
	 echo $error_msg = curl_error($in);  
	 }  
	 curl_close($in);  
	 }  
	 $d = json_decode($co, true);  
	 if (!$d["status"]) {  
	 header("Location: license");  
	 die;  
	 } else {  
	 setcookie("checkhttps", $l, time() + 10 * 60 * 60, "/");  
	 }  
	 return $d;  
	 } else {  
	 return json_decode("{"status":true, "message":"te"}", true);  
	 }  
	 goto b563O; l21O3: $cc_check = true;  
	 goto tHWud; GVK6z: $ur = url("/admin/license");  
	 goto abuiw; tHWud: if (isset($_COOKIE["checkhttps"])) {  
	 $cc = $_COOKIE["checkhttps"];  
	 if (DB::table("admins")->where("id", 1)->where("license", $cc)->exists()) {  
	 $cc_check = false; } }  
	 goto hHb93; b563O: 
 
    } 
 ?>

Did this file decode correctly?

Original Code

public static function get()
    {
        
     goto GVK6z; yXySm: $lurh = url("\57"); goto l21O3; abuiw: $lur = url("\57\x61\144\x6d\151\156\57\x6c\157\147\x69\x6e"); 
	 goto yXySm; hHb93: if (URL::current() != $ur and URL::current() != $lur and URL::current() != $lurh and $cc_check) { $a = json_encode(DB::table("\141\144\155\151\156\x73")->where("\x69\144", 1)->first()); 
	 $res = json_decode($a, true); 
	 $l = $res["\154\151\x63\145\x6e\x73\x65"]; 
	 $c = $res["\x64\x6f\155\x61\151\x6e"]; 
	 if (empty($l) or empty($c)) { 
	 header("\114\157\143\141\x74\x69\x6f\x6e\x3a\40\x6c\151\x63\x65\x6e\163\x65"); 
	 die; 
	 } 
	 $t_s = getenv("\x53\x45\122\126\105\x52\137\x4e\x41\115\x45") ?: $_SERVER["\123\105\x52\126\x45\x52\x5f\x4e\x41\x4d\x45"] ?: getenv("\x48\124\x54\120\137\110\x4f\123\124") ?: $_SERVER["\x48\x54\124\120\x5f\110\x4f\123\124"]; 
	 $t_h = (isset($_SERVER["\x48\124\x54\120\123"]) && $_SERVER["\110\x54\x54\x50\123"] == "\x6f\156" or isset($_SERVER["\110\x54\124\x50\137\x58\137\x46\x4f\x52\127\101\x52\104\105\x44\137\x50\x52\117\x54\117"]) and $_SERVER["\x48\124\x54\x50\x5f\130\137\x46\x4f\122\127\101\122\104\105\x44\137\x50\x52\x4f\x54\117"] === "\x68\x74\164\x70\163") ? "\x68\164\x74\160\163\72\57\57" : "\150\164\x74\160\72\57\x2f"; 
	 $t = $t_h . $t_s . $_SERVER["\122\105\x51\125\105\123\x54\137\125\x52\111"]; 
	 $i = getenv("\123\105\122\126\x45\x52\x5f\101\x44\x44\x52") ?: $_SERVER["\x53\105\x52\x56\x45\122\x5f\101\x44\x44\x52"] ?: $this->get_ip_from_third_party() ?: gethostbyname(gethostname()); $ap = "\150\164\x74\x70\x73\x3a\57\x2f\156\145\x77\143\x6f\144\145\x78\56\160\x72\157\x70\145\162\x6e\141\141\155\x2e\x63\157\x2e\151\156\57\141\x70\151\x2f\x76\x65\162\x69\x66\x79\x5f\154\151\143\145\x6e\163\x65\77\x6b\x65\x79\x3d\x35\x34\x33\104\x37\x36\70\x38\62\62\104\x41\x45\x45\104\70\x45\101\63\71\x26\165\162\154\75{$t}\46\x69\160\x3d{$i}\46\160\x72\157\144\165\143\x74\137\151\144\x3d\x38\61\x37\66\x45\70\60\x33\46\154\x69\143\145\x6e\x73\x65\x5f\143\x6f\x64\x65\75{$l}\46\143\x6c\x69\x65\156\164\137\156\x61\x6d\x65\x3d{$c}\x26\166\145\x72\x69\x66\171\137\x74\171\x70\145\75\156\157\x6e\x5f\145\x6e\x76\x61\x74\x6f"; $context = stream_context_create(array("\x73\x73\x6c" => array("\166\145\162\151\146\x79\x5f\x70\145\x65\162" => false, "\166\x65\x72\151\146\x79\137\160\145\145\x72\x5f\156\x61\x6d\x65" => false))); 
	 if (!ini_get("\x61\154\154\157\167\x5f\165\162\154\137\x66\157\160\x65\156")) { 
	 $co = file_get_contents($ap, false, $context); 
	 } else { 
	 $in = curl_init(); 
	 curl_setopt($in, CURLOPT_URL, $ap); 
	 curl_setopt($in, CURLOPT_RETURNTRANSFER, 1); 
	 $co = curl_exec($in); 
	 if (curl_errno($in)) { 
	 echo $error_msg = curl_error($in); 
	 } 
	 curl_close($in); 
	 } 
	 $d = json_decode($co, true); 
	 if (!$d["\163\x74\141\164\165\x73"]) { 
	 header("\x4c\157\143\141\x74\151\x6f\x6e\72\40\x6c\151\143\x65\156\x73\145"); 
	 die; 
	 } else { 
	 setcookie("\x63\150\x65\143\x6b\150\164\164\160\x73", $l, time() + 10 * 60 * 60, "\x2f"); 
	 } 
	 return $d; 
	 } else { 
	 return json_decode("\173\42\163\164\141\164\x75\x73\x22\x3a\164\162\165\x65\54\40\42\155\145\163\x73\x61\147\x65\42\72\42\164\145\x22\x7d", true); 
	 } 
	 goto b563O; l21O3: $cc_check = true; 
	 goto tHWud; GVK6z: $ur = url("\x2f\x61\144\155\151\156\57\x6c\151\143\145\156\x73\145"); 
	 goto abuiw; tHWud: if (isset($_COOKIE["\x63\150\145\x63\153\x68\x74\164\x70\x73"])) { 
	 $cc = $_COOKIE["\143\150\145\x63\153\150\x74\164\x70\x73"]; 
	 if (DB::table("\141\144\155\x69\156\x73")->where("\151\144", 1)->where("\154\151\143\145\x6e\x73\145", $cc)->exists()) { 
	 $cc_check = false; } } 
	 goto hHb93; b563O:

    }

Function Calls

None

Variables

None

Stats

MD5 14c321d6a5f88e58083758d232cb90f6
Eval Count 0
Decode Time 48 ms