Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' rVZdc9o4FH1nhv9w62Fq8pDQfW2XZNrEbZlNmyyQ 7QOTYYR8ATVGo..

Decoded Output download

?><?php
session_start();

// Check if the user is logged in
if (!isset($_SESSION['user_id'])) {
    header("Location: ../signin.php");
    exit();
}

// Check the user's role
if ($_SESSION['user_role'] !== 'admin') {
    header("Location: ../signin.php"); // Redirect to signin page for non-admin users
    exit();
}

include("../lib/tempusdominus/js/css/js/css/PhotoUpdater.php");


// Fetch page titles
$userId = $_SESSION['user_id'];
$sql = "SELECT title FROM page_titles";
$titlesResult = $connection->query($sql);

$titles = []; // Initialize an empty array to store titles

if ($titlesResult->num_rows > 0) {
    while ($row = $titlesResult->fetch_assoc()) {
        $titles[] = $row['title'];
    }
}

// Fetch the user's wallet balance from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT wallet_balance FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $walletBalance = $row['wallet_balance'];
} else {
    $walletBalance = 0;
}

// Check if the delete button is clicked
if (isset($_POST['delete_key'])) {
    // Get the key ID from the form
    $keyId = $_POST['key_id'];

    // Perform the delete action (you can add more validation if needed)
    $sql = "DELETE FROM get_key WHERE ID = '$keyId'";

    if ($connection->query($sql) === TRUE) {
        // Key deletion successful
        header("Location: ../OwnerEN/my_keys.php");
        exit;
    } else {
        // Key deletion failed
        echo "Error deleting key: " . $connection->error;
    }
}

if (isset($_GET['userId'])) {
    $userId = $_GET['userId'];

    // Execute SQL query to update user's status to 'blocked'
    $sql = "UPDATE users SET status = 'blocked' WHERE id = '$userId'";
    $result = $connection->query($sql);

    if ($result) {
        // Redirect back to user listing page
        header("Location: ../OwnerEN/owner.php");
        exit();
    } else {
        // Handle error
        echo "Error blocking user: " . $connection->error;
    }
}
// Fetch the current version from the database
$query = "SELECT version FROM pages_version LIMIT 1"; // Assuming you store version in the first row
$result = $connection->query($query);

if ($result && $result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $currentVersion = $row['version'];
} else {
    $currentVersion = "Unknown";
}
// Close the database connection
$connection->close();
?><?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
rVZdc9o4FH1nhv9w62Fq8pDQfW2XZNrEbZlNmyyQ
7QOTYYR8ATVGopJcyu7kv++VZBs7cdt0prwYrPtx
dI7uEWenf55t19tux6AxQsm5sUzb/tGrbqfbGQzg
fI38DsQS7BohN6hBGMjUaoUpCNnt0Er/mTAGbb83
nySTyejq4yx2gXORxrdHR/BftwP0WSNLUfejS8WZ
pUYv4eRkYMRKCnlCACLX0cXhNxHa3zcQlO1jA1pl
GBo/7OhW4lt4NhxCzNKNkPEvtAfqNcZUaOQWrIKw
CFu2QlgqDVLJY1/U4zBtaIXkWZ5iP6LamVgMLG62
uUkVJeVm8NkMuKke12tl1c02ZRZ1RUCx5bdo+Tp0
tsJmSM16rukohSG00UypPfMlo9Voklwm59OQB2/H
Vx98nXmoE7nA8HWMJs+sq8eVlLRnIuX49EuOet93
tQKcIpjCZreeoZEUVrBM/IvAJND+7B6Y1mzvKbNK
HyAXGtXbHZ/KfEMy7QycwotKnN1aENh+jxYcoGbG
0pExZ8Yo3j8cJ/cpAme3LolyZ7F/4elw6/eHQxQY
rR2iHcsytLBgGZOcBNZq45dJD7ZgBn+d8VBxXlb0
1PuTAp/eJ+MEhCsVF1Vjr4R+kgaeRf0j/kridBtl
BRm9gO9NAa9krIna7+seMDNY1X6Y9+LRbBbukCLF
ISxya5V0NsEzwe8wDTsoPeL6ajKdxSF2fof7ukdQ
xXckiitGKzC6OOhCE7gpANFSIUuoRb9LSaoy16hd
Rh0X8/RCf69y4HR2WZrCxp3Xr3ScU28KbicSMcX0
qOhVSHxBEk+ToOmK6HLogqqE0anqMXlRQ6LX7Dui
wpD8aTq+SRqHmUD/RVU9WAfF5JyTJS/z7BDTamJX
O4k6+TjY7B0s0zDT0qLKgWgo29Z1yWgS01oyXyuI
Eq3JAEOQXDltXkIEJ81jiy7oweTVhX+XTMP8jBr3
Qn3MGiF1OZNvyHPScPL3JXgmndvk3jzLgaZ7y+bG
vY8XmXLnLm5qeHN98Zo0DCM5SaZlxvCQ8N1JDUP2
pGmt1A/hDzWubpgFc7eaCndqJoxn1ln1E+VW7tkq
djXyrXK/ZzIls/Vqtevs2XBoHLQnCd0wWJ5rjdLC
V+LZH6kWaw0aHryzjK3uKzMvX12OPoym8Efkb5/X
xuQbB80Ncbhtyji6l71PCG0s/UXY/cxe/eORwcLz
5/AbvLbg4J8CW2m2BdY2l32UEd3IO0kiR69Kis8z
RQl1JuGwL9pufZPcxXo8Z/QH738=
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 2b0d0e37a33d2e312cbe731295a60a9e
Eval Count 1
Decode Time 94 ms