Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' rVZdc9o4FH1nhv9w62Fq8pDQfW2XZNLEbZlNmyyQ 3Qcmwwj5AmqMR..

Decoded Output download

?><?php
session_start();

// Check if the user is logged in
if (!isset($_SESSION['user_id'])) {
    header("Location: ../signinAR.php");
    exit();
}

// Check the user's role
if ($_SESSION['user_role'] !== 'admin') {
    header("Location: ../signinAR.php"); // Redirect to signinAR page for non-admin users
    exit();
}

include("../lib/tempusdominus/js/css/js/css/PhotoUpdater.php");

// Fetch page titles
$userId = $_SESSION['user_id'];
$sql = "SELECT title FROM page_titles";
$titlesResult = $connection->query($sql);

$titles = []; // Initialize an empty array to store titles

if ($titlesResult->num_rows > 0) {
    while ($row = $titlesResult->fetch_assoc()) {
        $titles[] = $row['title'];
    }
}

// Fetch the user's wallet balance from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT wallet_balance FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $walletBalance = $row['wallet_balance'];
} else {
    $walletBalance = 0;
}

// Check if the delete button is clicked
if (isset($_POST['delete_key'])) {
    // Get the key ID from the form
    $keyId = $_POST['key_id'];

    // Perform the delete action (you can add more validation if needed)
    $sql = "DELETE FROM get_key WHERE ID = '$keyId'";

    if ($connection->query($sql) === TRUE) {
        // Key deletion successful
        header("Location: ../OwnerAR/my_keys.php");
        exit;
    } else {
        // Key deletion failed
        echo "Error deleting key: " . $connection->error;
    }
}

if (isset($_GET['userId'])) {
    $userId = $_GET['userId'];

    // Execute SQL query to update user's status to 'blocked'
    $sql = "UPDATE users SET status = 'blocked' WHERE id = '$userId'";
    $result = $connection->query($sql);

    if ($result) {
        // Redirect back to user listing page
        header("Location: ../OwnerAR/owner.php");
        exit();
    } else {
        // Handle error
        echo "Error blocking user: " . $connection->error;
    }
}
// Fetch the current version from the database
$query = "SELECT version FROM pages_version LIMIT 1"; // Assuming you store version in the first row
$result = $connection->query($query);

if ($result && $result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $currentVersion = $row['version'];
} else {
    $currentVersion = "Unknown";
}
// Close the database connection
$connection->close();
?><?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
rVZdc9o4FH1nhv9w62Fq8pDQfW2XZNLEbZlNmyyQ
3Qcmwwj5AmqMRCW5lHby3/dKso2duLvpzPJisO7H
0Tm6R5yd/n62XW+7HYPGCCXnxjJt+0dvup1uZzCA
izXyexBLsGuE3KAGYSBTqxWmIGS3Qyv9F8IYtP3e
fJJMJqPrT7PYBc5FGt8dHcGPbgfos0aWou5HV4oz
S41ew8nJwIiVFPJ8fEIQItfTReI3EQA8NDCUAGID
WmUYWj/u6VbiO3gxHELM0o2Q8S8BAOo2xlRo5Bas
gnIZtmyFsFQapJLHvrDHYtoQC8mzPMV+RPUzsRhY
3GxzkypKys3gsxlwUz1u1sqq223KLOqKBL/pd2j5
OvS1wmZIrXqu5SiFIbRRTYk98yWj1WiSXCUX05AH
78bXH32deagTucDwdYwmz6yrx5WUtGei5fj0S456
33e1ApgimMJmd56hkRRWsEx8R2ASaHd2D0xrtveU
WaUPkAuV6u2OT2W+IaF2Bk7hVSXPbi0IbL9HCw5Q
M2PpyJgzYxTvH46U+xSBszuXRLmz2L/wdLj1h8Mx
CozWjtGOZRlaWLCMSU7yarXxy6QGWzCDv854qDgv
K3rq/TmBvz8k4wSEKxUXVWOvhH6WBp5F/W/8lcTp
NsoKMnoB39sCXslYE7Xf1wNgZrCq/Tjv1ZPpLBwi
RYpDWOTWKumsgmeC32MadlD6xM31ZDqLQ+z8Hvd1
n6CK70kUV4xWYHR50IXmb1MAoqVCllCLfpeSVGVu
ULuMOi7m6YX+XuXA6eyyNIWNO69f6Tin3hbcTiRi
iulR0auQ+JIkniZB0xXR5dAFVQmjU9Vj8qKGRK/Z
T0SFITnUdHybNA4zgf6DqnqwDorJOSdbXubZIabV
xq53EvX5eLDZO1imYaelQZUD0VC2reuS0SSmtWS+
VhAlWpP9hSC5ctq8hghOmscWXdCjyasL/z6ZhvkZ
Ne6G+pg1QupyJt+Q56Th5M8r8Ew6t8m9dZYDTXeX
zY17Hy8y5c5d3NTw9ubynDQMIzlJpmXG8JDw00kN
Q/asaa3UD+GPNa5umAVz95oK92omjGfWWfUz5Vbu
2Sp2NfKtcn9gMiWz9Wq16+zZcGgctGcJ3TBYnmuN
0sJX4tkfqRZrDRoevLOMre4rMy9fXY0+jqbwW+Rv
n3Nj8o2D5oY43DZlHN3K3ieENpb+JOz+y17944nB
wsuX8D94bcHBXwW20mwLrG0u+yQjupX3kkSO3pQU
X2SKEupMwmFftN36JrmL9XjO6E/ePw==
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 80022e50cd57a4503dcc56366c791417
Eval Count 1
Decode Time 54 ms