Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
goto exmDk; d7ZBW: evTVk: goto XXyEE; XaMQP: $BBPxy++; goto MlUX6; e_APi: echo "\x23\105\1..
Decoded Output download
<? goto exmDk; d7ZBW: evTVk: goto XXyEE; XaMQP: $BBPxy++; goto MlUX6; e_APi: echo "#EXTINF:-1 group-title="" . $vv636 . "" tvg-logo="" . $BNFcn . "logo.png"," . ucwords(strtolower($Dm0RX)) . " - STOP"; goto YmTPd; v51Py: $BBPxy = 0; goto d7ZBW; hoV9l: $vv636 = $ev5Z2[2]; goto ONaZB; YDzwd: $Dm0RX = $ev5Z2[1]; goto hoV9l; ONaZB: $ZoNMp = $ev5Z2[0]; goto NJaQU; exmDk: header("Content-Type: text/plain"); goto CWGZz; NJaQU: echo "#EXTINF:-1 group-title="" . $vv636 . "" tvg-logo="" . $BNFcn . "logo.png"," . ucwords(strtolower($Dm0RX)) . " - START"; goto Aqjbr; nVWh2: Gn7cv: goto XaMQP; lTkkL: $LRv8X = explode(PHP_EOL, file_get_contents("id.txt")); goto cxqaw; Aqjbr: echo PHP_EOL; goto fcrg8; XXyEE: if (!($BBPxy < count($LRv8X))) { goto xWLn0; } goto Zwv0v; Zwv0v: $ev5Z2 = explode(";", $LRv8X[$BBPxy]); goto YDzwd; qbm2t: echo PHP_EOL; goto e_APi; CWGZz: $KEsa8 = "http://{$_SERVER["HTTP_HOST"]}{$_SERVER["PHP_SELF"]}"; goto F0Nu2; fcrg8: echo $BNFcn . "?id=" . $ZoNMp . "&type=viaplay&action=START"; goto qbm2t; F0Nu2: $BNFcn = str_replace("on_off_channels.php", "api.php", $KEsa8); goto lTkkL; hYkQS: echo $BNFcn . "?id=" . $ZoNMp . "&type=viaplay&action=STOP"; goto YGGAb; cxqaw: echo "#EXTM3U" . PHP_EOL; goto v51Py; YmTPd: echo PHP_EOL; goto hYkQS; MlUX6: goto evTVk; goto GI1EV; YGGAb: echo PHP_EOL . PHP_EOL; goto nVWh2; GI1EV: xWLn0: ?>
Did this file decode correctly?
Original Code
goto exmDk; d7ZBW: evTVk: goto XXyEE; XaMQP: $BBPxy++; goto MlUX6; e_APi: echo "\x23\105\130\x54\111\x4e\106\x3a\x2d\x31\40\x67\x72\x6f\165\x70\55\x74\151\x74\x6c\x65\75\x22" . $vv636 . "\42\40\164\166\147\55\154\x6f\147\x6f\75\x22" . $BNFcn . "\x6c\x6f\x67\x6f\x2e\x70\156\x67\42\x2c" . ucwords(strtolower($Dm0RX)) . "\40\55\x20\123\x54\117\x50"; goto YmTPd; v51Py: $BBPxy = 0; goto d7ZBW; hoV9l: $vv636 = $ev5Z2[2]; goto ONaZB; YDzwd: $Dm0RX = $ev5Z2[1]; goto hoV9l; ONaZB: $ZoNMp = $ev5Z2[0]; goto NJaQU; exmDk: header("\103\157\x6e\x74\145\156\x74\55\x54\171\x70\x65\x3a\40\x74\145\170\x74\57\x70\x6c\141\151\x6e"); goto CWGZz; NJaQU: echo "\43\x45\130\x54\x49\x4e\x46\72\55\61\40\x67\x72\x6f\165\160\x2d\164\151\x74\x6c\145\x3d\42" . $vv636 . "\42\x20\x74\x76\147\55\x6c\157\x67\x6f\x3d\42" . $BNFcn . "\154\x6f\147\157\56\160\156\x67\42\54" . ucwords(strtolower($Dm0RX)) . "\x20\55\x20\123\x54\101\122\x54"; goto Aqjbr; nVWh2: Gn7cv: goto XaMQP; lTkkL: $LRv8X = explode(PHP_EOL, file_get_contents("\x69\x64\56\164\x78\x74")); goto cxqaw; Aqjbr: echo PHP_EOL; goto fcrg8; XXyEE: if (!($BBPxy < count($LRv8X))) { goto xWLn0; } goto Zwv0v; Zwv0v: $ev5Z2 = explode("\x3b", $LRv8X[$BBPxy]); goto YDzwd; qbm2t: echo PHP_EOL; goto e_APi; CWGZz: $KEsa8 = "\x68\164\164\160\x3a\x2f\x2f{$_SERVER["\110\124\124\120\x5f\110\117\123\124"]}{$_SERVER["\120\110\x50\137\123\x45\x4c\x46"]}"; goto F0Nu2; fcrg8: echo $BNFcn . "\x3f\151\x64\75" . $ZoNMp . "\46\164\171\x70\x65\x3d\x76\x69\141\x70\154\141\x79\x26\x61\x63\x74\151\157\156\x3d\123\x54\101\x52\124"; goto qbm2t; F0Nu2: $BNFcn = str_replace("\x6f\x6e\x5f\157\x66\146\137\x63\x68\141\156\156\145\154\x73\56\x70\150\x70", "\x61\160\151\56\x70\150\160", $KEsa8); goto lTkkL; hYkQS: echo $BNFcn . "\x3f\151\x64\x3d" . $ZoNMp . "\46\164\171\x70\145\x3d\166\151\141\x70\154\141\x79\x26\141\143\x74\151\157\x6e\x3d\x53\x54\x4f\x50"; goto YGGAb; cxqaw: echo "\x23\x45\130\x54\x4d\x33\x55" . PHP_EOL; goto v51Py; YmTPd: echo PHP_EOL; goto hYkQS; MlUX6: goto evTVk; goto GI1EV; YGGAb: echo PHP_EOL . PHP_EOL; goto nVWh2; GI1EV: xWLn0:
Function Calls
None |
Stats
MD5 | 68374950f589e5195b84bf3d150c89c2 |
Eval Count | 0 |
Decode Time | 51 ms |