Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php goto uQ6tD; G3Vx0: function url_get_data($url) { $ch = curl_init($url); curl_setop..

Decoded Output download

<?php 
 goto uQ6tD; G3Vx0: function url_get_data($url) { $ch = curl_init($url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); $data = curl_exec($ch); curl_close($ch); return $data; } goto vF3n3; SOjy6: $validate = $controller["scmpg"]["Posten"]["AuthKey"][0]; goto AMZcH; EoUD6: $user = $Purchase_Key; goto ca3UK; JF44z: $var_dis = $var_loc . ":" . $var_rad; goto EoUD6; ca3UK: $controller = json_decode(url_get_data("http://{$var_dis}/requests/distro/{$user}"), true); goto SOjy6; TaGZl: if ($scriptStatus == '' || $scriptStatus == null) { header("HTTP/1.0 404 Not Found"); die("<h3>Oops! Unable to verify this script, contact administrator / developer.</h3>"); } else { } goto fa3FE; AMZcH: $scriptStatus = $controller["scmpg"]["Posten"]["scriptStatus"]; goto TaGZl; vF3n3: $var_loc = long2ip(37369936); goto tvUfd; tvUfd: $var_rad = hexdec("1bb"); goto JF44z; uQ6tD: require "../CONFIG.php"; goto G3Vx0; fa3FE: ?>

Did this file decode correctly?

Original Code

<?php
 goto uQ6tD; G3Vx0: function url_get_data($url) { $ch = curl_init($url); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 0); $data = curl_exec($ch); curl_close($ch); return $data; } goto vF3n3; SOjy6: $validate = $controller["\163\x63\x6d\x70\147"]["\x50\x6f\x73\164\145\156"]["\101\165\x74\x68\x4b\145\x79"][0]; goto AMZcH; EoUD6: $user = $Purchase_Key; goto ca3UK; JF44z: $var_dis = $var_loc . "\72" . $var_rad; goto EoUD6; ca3UK: $controller = json_decode(url_get_data("\x68\x74\x74\160\x3a\57\57{$var_dis}\x2f\162\145\x71\165\145\x73\164\163\x2f\144\151\163\164\x72\157\x2f{$user}"), true); goto SOjy6; TaGZl: if ($scriptStatus == '' || $scriptStatus == null) { header("\110\x54\124\120\57\61\x2e\60\40\x34\x30\x34\40\116\x6f\x74\40\106\157\x75\x6e\x64"); die("\x3c\x68\63\x3e\x4f\157\160\163\41\40\x55\x6e\x61\142\x6c\x65\x20\164\x6f\x20\x76\145\x72\x69\x66\x79\40\164\150\151\x73\40\x73\143\162\151\x70\164\54\x20\143\157\156\164\x61\143\164\40\141\144\x6d\x69\156\151\163\164\162\x61\x74\x6f\x72\40\x2f\x20\144\145\166\x65\154\x6f\160\x65\x72\x2e\x3c\x2f\150\x33\76"); } else { } goto fa3FE; AMZcH: $scriptStatus = $controller["\x73\143\155\160\x67"]["\120\x6f\163\164\x65\x6e"]["\x73\x63\x72\151\x70\164\x53\164\141\164\165\x73"]; goto TaGZl; vF3n3: $var_loc = long2ip(37369936); goto tvUfd; tvUfd: $var_rad = hexdec("\x31\x62\x62"); goto JF44z; uQ6tD: require "\56\56\57\x43\117\116\106\111\x47\56\x70\x68\160"; goto G3Vx0; fa3FE: ?>

Function Calls

None

Variables

None

Stats

MD5 553a3409f99710508bac08aa0eb633cc
Eval Count 0
Decode Time 30 ms