Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
eval(str_rot13(gzinflate(str_rot13(base64_decode(('vUdbQtswFH6v1P9jsJAapK7tNvEwdaMN1KK9WaJ..
Decoded Output download
echo "<center>
<form name=\"frmcontadd\" action=\"\" method=\"post\">
<textarea placeholder=\"http://yuzanotes.blogspot.com/shell.php\" name=\"url\" cols=115 rows=10></textarea><br><br><input class=\"subbtn\" type=\"submit\" name=\"Submit\" value=\"Gass Poll\"></form>";
function get_http_response_code($theurl) {
$headers = get_headers($theurl);
$status = substr($headers[0], 9, 3);
$p = parse_url($theurl);
$host = explode(':', $p['host']);
$hostname = $host[0];
if ($status == 200) {
$visitor = $_SERVER["REMOTE_ADDRS"];
$judul = "shell: $theurl ";
$body = "shell: $theurl";
$writeuRl = $theurl . "
";
$fh = fopen("hasil.txt", "a");
fwrite($fh, $writeuRl, strlen($writeuRl));
echo "<strong><font color=Green>Found</font></strong> - <a href=\"" . $theurl . "\" target=_blank>" . $theurl . "</a><br />";
} elseif ($status == 500) {
echo "<strong><font color=black>" . $status . " 500 Internal Server Error !</font></strong> - <a href=\"" . $theurl . "\" target=_blank>" . $theurl . "</a><br />";
} else {
$writeuRl = $theurl . "
";
$fh = fopen("sampah.txt", "a");
fwrite($fh, $writeuRl, strlen($writeuRl));
echo "<strong><font color=red>Not Found</font></strong> - <a href=\"" . $theurl . "\" target=_blank>" . $theurl . "</a><br />";
}
}
if (isset($_POST['Submit'])) {
$hosts = explode("
", $_POST['url']);
$values = array();
foreach ($hosts as $host) {
if ($host != "") {
@get_http_response_code("$host");
}
}
echo "<br /><strong>Selesai</strong>";
}
Did this file decode correctly?
Original Code
eval(str_rot13(gzinflate(str_rot13(base64_decode(('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'))))));
Function Calls
| gzinflate | 1 |
| str_rot13 | 2 |
| base64_decode | 1 |
Stats
| MD5 | 51f350833550c33cd8237f8d02565fdc |
| Eval Count | 1 |
| Decode Time | 115 ms |