Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

def oPJQNHDS465D(): rbx = { 1: "yachafi9", 2: "men", 3: "okkay", 4: "wow", 5: "elderberry"..

Decoded Output download

<?  def oPJQNHDS465D(): rbx = { 1: "yachafi9", 2: "men", 3: "okkay", 4: "wow", 5: "elderberry", 6: "fi9", 7: "raaaaassiii", 8: "honeydew", 9: "loveyou...", 10: "lemon", 11: "mango", 12: "nectarine", 13: "orange", 14: "papaya", 15: "t00l", 16: "raspberry", 17: "strawberry", 18: "tangerine", 19: "ugli", 20: "vanilla", 21: "watermelon", 22: "l7oobb", 23: "yam", 24: "rak", 25: "avocado", 26: "blackberry", 27: "powerful", 28: "cantaloupe", 29: "coconut", 30: "cranberry", 31: "GO", 32: "_", 33: "guava", 34: "jackfruit", 35: "SECURINETSISITCOM{", 36: "FLAG", 37: "mulberry", 38: "FLAG", 39: "anonymous", 40: "pear", 41: "pineapple", 42: "plum", 43: "pomegranate", 44: "starfruit", 45: "it", 46: "hard", 47: "", 48: "currant", 49: "dewberry", 50: "gooseberry", 51: "huckleberry", 52: "longan", 53: "1s", 54: "persimmon", 55: "plantain", 56: "pumpkin", 57: "sapodilla", 58: "soursop", 59: "tamarillo", 60: "N0t_V3ry-H4Rd", 61: "basil", 62: "carrot", 63: "python", 64: "garlic", 65: "key", 66: "HAHA", 67: "maybe", 68: "onion", 69: "COM", 70: "hacking", 71: "potato", 72: "radish", 73: "spinach", 74: "T", 75: "IS", 76: "obfuscation", 77: "broccoli", 78: "y0u", 79: "Go", 80: "is", 81: "chard", 82: "DHII33", 83: "YOU", 84: "dill", 85: "eggplant", 86: "msfconsole", 87: "fennel", 88: "leek", 89: "lentil", 90: "mushroom", 91: "okra", 92: "pea", 93: "pumpkin", 94: "rhubarb", 95: "trojan", 96: "rat", 97: "yam", 98: "zucchini", 99: "}", 100: "keylogger" } WORD=2 DWORD=4 QWORD=8 DATA015524D8 = 631225555 DATA0155D276 = 53741555211 DATA01552C48 = 2741122 DATA01X55456 = 1523324 DATA02555678 = 2741122 DATA015C5248 = 1256486 DATA015V5656 = 256454 DATA015V5248 = 1256486 DATA0V15510256 = 1458315 DATA015524855 = 1256486 DATA015525416 = 1458315 eax = rbx[QWORD+25] ebp = rbx[55] esp = rbx[QWORD+WORD*2] eip = rbx[QWORD*2] ax = rbx[QWORD+WORD+DWORD+2] bx = rbx[QWORD+52] cx = rbx[QWORD+25] eax = rbx[QWORD+5] ebx = rbx[55] ecx = rbx[DWORD+QWORD+2] edx = rbx[WORD+2] esi = rbx[55] edi = rbx[QWORD+1] ebp = rbx[QWORD*4-5] esp = rbx[QWORD+WORD+5] eip = rbx[QWORD*2+WORD*8] ax = rbx[QWORD+1] bx = rbx[QWORD*2+WORD*8] cx = rbx[DATA015524855-1256451] edi+=cx ebx = rbx[QWORD+55] edx = rbx[QWORD*2+WORD*8] ecx = rbx[QWORD*2+37] edi+=ebx edi+=edx ax = rbx[DATA0155D276-53741555112] esi = rbx[QWORD*2+37] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= ecx edi+=bx bp = rbx[QWORD+WORD+DWORD+2] r9 = rbx[QWORD+52] edi+= ebp ip = rbx[QWORD+25] r8 = rbx[55] edi+= eip sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= esp si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= ax si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] ide = str(DATA02555678) for char in edi[DATA015524D8-631225597:]: ide+=char char = ide[DATA01X55456-1523317:] # Example password logic # Return password result to the template return char @app.route("/", methods=["GET", "POST"]) def admin_verification(): if request.method == "POST": input_key = request.form.get("admin_key", "") if input_key == oPJQNHDS465D(): try: with open("flag.txt", "r") as file: return file.read() ?>

Did this file decode correctly?

Original Code

def oPJQNHDS465D(): rbx = { 1: "yachafi9", 2: "men", 3: "okkay", 4: "wow", 5: "elderberry", 6: "fi9", 7: "raaaaassiii", 8: "honeydew", 9: "loveyou...", 10: "lemon", 11: "mango", 12: "nectarine", 13: "orange", 14: "papaya", 15: "t00l", 16: "raspberry", 17: "strawberry", 18: "tangerine", 19: "ugli", 20: "vanilla", 21: "watermelon", 22: "l7oobb", 23: "yam", 24: "rak", 25: "avocado", 26: "blackberry", 27: "powerful", 28: "cantaloupe", 29: "coconut", 30: "cranberry", 31: "GO", 32: "_", 33: "guava", 34: "jackfruit", 35: "SECURINETSISITCOM{", 36: "FLAG", 37: "mulberry", 38: "FLAG", 39: "anonymous", 40: "pear", 41: "pineapple", 42: "plum", 43: "pomegranate", 44: "starfruit", 45: "it", 46: "hard", 47: "", 48: "currant", 49: "dewberry", 50: "gooseberry", 51: "huckleberry", 52: "longan", 53: "1s", 54: "persimmon", 55: "plantain", 56: "pumpkin", 57: "sapodilla", 58: "soursop", 59: "tamarillo", 60: "N0t_V3ry-H4Rd", 61: "basil", 62: "carrot", 63: "python", 64: "garlic", 65: "key", 66: "HAHA", 67: "maybe", 68: "onion", 69: "COM", 70: "hacking", 71: "potato", 72: "radish", 73: "spinach", 74: "T", 75: "IS", 76: "obfuscation", 77: "broccoli", 78: "y0u", 79: "Go", 80: "is", 81: "chard", 82: "DHII33", 83: "YOU", 84: "dill", 85: "eggplant", 86: "msfconsole", 87: "fennel", 88: "leek", 89: "lentil", 90: "mushroom", 91: "okra", 92: "pea", 93: "pumpkin", 94: "rhubarb", 95: "trojan", 96: "rat", 97: "yam", 98: "zucchini", 99: "}", 100: "keylogger" } WORD=2 DWORD=4 QWORD=8 DATA015524D8 = 631225555 DATA0155D276 = 53741555211 DATA01552C48 = 2741122 DATA01X55456 = 1523324 DATA02555678 = 2741122 DATA015C5248 = 1256486 DATA015V5656 = 256454 DATA015V5248 = 1256486 DATA0V15510256 = 1458315 DATA015524855 = 1256486 DATA015525416 = 1458315 eax = rbx[QWORD+25] ebp = rbx[55] esp = rbx[QWORD+WORD*2] eip = rbx[QWORD*2] ax = rbx[QWORD+WORD+DWORD+2] bx = rbx[QWORD+52] cx = rbx[QWORD+25] eax = rbx[QWORD+5] ebx = rbx[55] ecx = rbx[DWORD+QWORD+2] edx = rbx[WORD+2] esi = rbx[55] edi = rbx[QWORD+1] ebp = rbx[QWORD*4-5] esp = rbx[QWORD+WORD+5] eip = rbx[QWORD*2+WORD*8] ax = rbx[QWORD+1] bx = rbx[QWORD*2+WORD*8] cx = rbx[DATA015524855-1256451] edi+=cx ebx = rbx[QWORD+55] edx = rbx[QWORD*2+WORD*8] ecx = rbx[QWORD*2+37] edi+=ebx edi+=edx ax = rbx[DATA0155D276-53741555112] esi = rbx[QWORD*2+37] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= ecx edi+=bx bp = rbx[QWORD+WORD+DWORD+2] r9 = rbx[QWORD+52] edi+= ebp ip = rbx[QWORD+25] r8 = rbx[55] edi+= eip sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= esp si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] edi+= ax si = rbx[55] sp = rbx[QWORD+WORD*2] di = rbx[QWORD*2] ide = str(DATA02555678) for char in edi[DATA015524D8-631225597:]: ide+=char char = ide[DATA01X55456-1523317:] # Example password logic # Return password result to the template return char @app.route("/", methods=["GET", "POST"]) def admin_verification(): if request.method == "POST": input_key = request.form.get("admin_key", "") if input_key == oPJQNHDS465D(): try: with open("flag.txt", "r") as file: return file.read()

Function Calls

None

Variables

None

Stats

MD5 7f953bd2a6cc6776504a89a1590b37c9
Eval Count 0
Decode Time 52 ms