Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php /* __________________________________________________ | Obfuscated by YAK P..

Decoded Output download

<?php 
/*   __________________________________________________ 
    |  Obfuscated by YAK Pro - Php Obfuscator  2.0.14  | 
    |              on 2024-01-17 18:22:19              | 
    |    GitHub: https://github.com/pk-fr/yakpro-po    | 
    |__________________________________________________| 
*/ 
 goto RrSCV; KF8BR: yNtI1: goto GXKjb; J48oH: $qJjRC = HqdrT($UH4Ad, $d48jQ); goto hCKIG; s1Z2M: echo json_encode(["valid" => $qJjRC]); goto kE4cO; hCKIG: header("Content-Type: application/json"); goto s1Z2M; JjBaq: $d48jQ = $_GET["domain"] ?? ''; goto J48oH; RrSCV: if (!(!isset($_SERVER["HTTP_USER_AGENT"]) || strpos($_SERVER["HTTP_USER_AGENT"], "curl") === false)) { goto yNtI1; } goto ugeuV; iJaPE: exit; goto KF8BR; GXKjb: $UH4Ad = $_GET["license"] ?? ''; goto JjBaq; ugeuV: echo "\xa    <!DOCTYPE html>
    <html lang="en">\xa    <head>\xa        <meta charset="UTF-8">\xa        <meta name="viewport" content="width=device-width, initial-scale=1.0">\xa        <title>Awesome</title>\xa        <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png">\xa        <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png">
        <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png">\xa        <link rel="icon" type="image/png" sizes="192x192" href="android-chrome-192x192.png">\xa        <link rel="icon" type="image/png" sizes="512x512" href="android-chrome-512x512.png">
        <link rel="manifest" href="site.webmanifest">
        <meta name="msapplication-TileColor" content="#209CEE">\xa        <meta name="theme-color" content="#ffffff">\xa    </head>
    <body>
        <h1 style="text-align:center; margin: auto;">You are awesome.</h1>\xa    </body>
    </html>\xa    "; goto iJaPE; kE4cO: function hQdrT($UH4Ad, $d48jQ) { goto fXKjj; fXKjj: $Qzwx8 = "localhost"; goto xpoft; vuIBk: $BzKiw = "lf?68nkSQAkH"; goto AoMh6; AoMh6: $f2EmQ = "dreamaff_dqapps8"; goto GClEG; xpoft: $RHnyf = "dreamaff_dqapps8"; goto vuIBk; GClEG: try { goto er_xZ; er_xZ: $z4Jut = new PDO("mysql:host={$Qzwx8};dbname={$f2EmQ}", $RHnyf, $BzKiw); goto Jsiru; sxEXN: $dj6bD->bindParam(":license", $UH4Ad); goto M7Car; MwJi4: goto RjRJp; goto dXhPy; jH3V8: return false; goto MwJi4; KGcNp: $SEMcb = $dj6bD->fetch(PDO::FETCH_ASSOC); goto H08mQ; HTilt: $BWGjf = "SELECT * FROM apiKeys WHERE licenseKey = :license AND domain = :domain"; goto ZitGl; XctzG: return true; goto Uu4s2; Jsiru: $z4Jut->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION); goto HTilt; cw6rF: $dj6bD->execute(); goto KGcNp; Uu4s2: RjRJp: goto c6SDb; dXhPy: BkvSg: goto XctzG; H08mQ: if ($SEMcb && strtotime($SEMcb["expireDate"]) >= time()) { goto BkvSg; } goto jH3V8; M7Car: $dj6bD->bindParam(":domain", $d48jQ); goto cw6rF; ZitGl: $dj6bD = $z4Jut->prepare($BWGjf); goto sxEXN; c6SDb: } catch (PDOException $X1_LG) { echo "Connection failed: " . $X1_LG->getMessage(); } goto w9AB3; w9AB3: } 
 ?>

Did this file decode correctly?

Original Code

<?php
/*   __________________________________________________
    |  Obfuscated by YAK Pro - Php Obfuscator  2.0.14  |
    |              on 2024-01-17 18:22:19              |
    |    GitHub: https://github.com/pk-fr/yakpro-po    |
    |__________________________________________________|
*/
 goto RrSCV; KF8BR: yNtI1: goto GXKjb; J48oH: $qJjRC = HqdrT($UH4Ad, $d48jQ); goto hCKIG; s1Z2M: echo json_encode(["\166\x61\x6c\151\144" => $qJjRC]); goto kE4cO; hCKIG: header("\x43\157\156\x74\x65\x6e\x74\x2d\124\171\x70\x65\x3a\40\141\x70\x70\x6c\x69\x63\141\x74\151\157\x6e\57\x6a\163\157\x6e"); goto s1Z2M; JjBaq: $d48jQ = $_GET["\x64\157\155\141\151\156"] ?? ''; goto J48oH; RrSCV: if (!(!isset($_SERVER["\x48\x54\x54\x50\137\x55\123\x45\122\x5f\x41\x47\x45\116\x54"]) || strpos($_SERVER["\110\x54\x54\120\137\x55\x53\x45\x52\x5f\101\107\x45\x4e\124"], "\x63\165\x72\x6c") === false)) { goto yNtI1; } goto ugeuV; iJaPE: exit; goto KF8BR; GXKjb: $UH4Ad = $_GET["\x6c\x69\143\x65\x6e\163\x65"] ?? ''; goto JjBaq; ugeuV: echo "\xa\40\40\40\40\x3c\41\x44\x4f\x43\x54\x59\x50\x45\40\150\164\x6d\154\76\12\x20\x20\x20\40\x3c\150\164\155\x6c\x20\x6c\141\x6e\x67\x3d\42\145\x6e\x22\x3e\xa\x20\40\40\x20\x3c\150\145\141\144\76\xa\x20\40\x20\40\40\x20\x20\x20\74\x6d\x65\x74\x61\40\x63\150\141\x72\163\145\x74\x3d\x22\x55\124\x46\x2d\x38\42\x3e\xa\40\x20\x20\x20\x20\40\x20\x20\x3c\155\x65\x74\141\x20\156\x61\x6d\145\75\42\166\x69\x65\167\160\157\x72\164\x22\x20\x63\x6f\156\x74\145\x6e\x74\75\x22\x77\151\x64\164\x68\x3d\144\145\x76\151\143\145\55\167\151\144\x74\x68\x2c\x20\151\x6e\151\164\x69\x61\x6c\x2d\163\143\141\154\x65\75\61\x2e\x30\42\x3e\xa\40\40\x20\x20\40\x20\x20\x20\x3c\x74\x69\164\x6c\145\x3e\101\x77\145\x73\x6f\155\x65\x3c\57\164\x69\164\x6c\x65\76\xa\40\40\x20\40\x20\40\x20\40\x3c\154\x69\x6e\153\40\162\145\x6c\75\x22\141\x70\x70\x6c\x65\x2d\164\157\x75\143\x68\x2d\151\x63\x6f\156\42\x20\x73\x69\x7a\145\x73\x3d\x22\x31\70\x30\170\61\70\x30\x22\40\x68\x72\x65\146\75\42\141\x70\x70\x6c\x65\55\164\157\x75\143\150\55\151\x63\157\x6e\x2e\x70\156\147\x22\76\xa\40\x20\x20\x20\40\x20\40\x20\74\x6c\151\156\153\40\162\x65\154\x3d\x22\x69\x63\157\156\42\40\164\x79\160\145\75\x22\x69\155\141\147\145\x2f\160\156\x67\42\x20\x73\151\172\145\x73\75\x22\63\62\x78\63\x32\42\40\150\x72\145\146\75\42\146\x61\166\x69\143\157\156\x2d\x33\x32\170\63\x32\x2e\x70\156\x67\x22\x3e\12\x20\40\x20\40\40\x20\40\x20\74\x6c\x69\x6e\153\x20\162\x65\x6c\x3d\x22\x69\x63\157\156\42\40\x74\x79\160\x65\75\42\151\x6d\141\x67\x65\57\160\x6e\147\x22\40\163\x69\172\145\163\x3d\x22\61\x36\170\x31\x36\x22\40\150\162\145\146\x3d\42\x66\141\166\151\143\157\x6e\x2d\x31\x36\170\x31\66\56\x70\156\147\42\76\xa\40\40\x20\40\40\x20\40\x20\x3c\x6c\151\x6e\x6b\40\162\x65\154\75\x22\x69\x63\157\x6e\42\40\x74\171\160\x65\x3d\42\151\x6d\x61\x67\x65\x2f\x70\156\147\x22\40\163\151\172\x65\x73\75\x22\x31\x39\x32\x78\61\x39\x32\x22\40\150\x72\x65\146\x3d\x22\x61\x6e\x64\162\157\151\144\x2d\x63\150\x72\157\155\x65\x2d\x31\71\x32\x78\x31\71\62\x2e\x70\156\147\42\x3e\xa\40\40\40\x20\40\40\x20\40\x3c\x6c\151\156\153\x20\162\x65\154\75\42\151\x63\157\x6e\42\x20\164\x79\x70\x65\75\42\151\x6d\141\147\x65\57\160\156\147\x22\x20\x73\151\172\145\163\x3d\42\x35\61\x32\x78\x35\61\x32\42\x20\x68\x72\x65\146\x3d\x22\x61\x6e\144\162\157\x69\x64\x2d\x63\x68\162\157\x6d\x65\55\x35\x31\x32\170\65\x31\62\56\x70\x6e\147\42\x3e\12\40\x20\x20\x20\40\40\x20\40\x3c\x6c\x69\x6e\153\40\x72\x65\x6c\75\x22\155\141\156\151\146\145\163\x74\x22\40\150\x72\145\146\x3d\42\163\x69\164\x65\56\167\145\142\x6d\x61\x6e\151\x66\x65\x73\x74\42\x3e\12\40\40\40\x20\x20\x20\x20\40\x3c\x6d\145\x74\x61\40\x6e\x61\155\x65\75\x22\155\x73\x61\x70\160\x6c\x69\x63\141\164\x69\157\x6e\55\x54\151\x6c\145\x43\x6f\x6c\x6f\x72\42\x20\x63\157\x6e\x74\x65\x6e\164\75\42\43\62\x30\x39\103\105\x45\42\x3e\xa\40\40\x20\40\x20\40\40\40\x3c\155\x65\164\141\40\156\x61\x6d\x65\x3d\42\164\150\x65\x6d\x65\x2d\x63\157\x6c\x6f\x72\42\x20\x63\x6f\156\164\145\156\x74\x3d\42\43\146\146\146\x66\146\146\x22\x3e\xa\x20\40\x20\x20\x3c\x2f\150\x65\141\144\76\12\40\x20\x20\x20\74\x62\x6f\x64\171\x3e\12\x20\x20\x20\40\x20\x20\40\x20\x3c\x68\x31\x20\x73\164\171\x6c\x65\75\42\164\145\x78\x74\55\141\154\151\147\156\72\143\145\x6e\164\x65\x72\x3b\40\155\141\x72\147\x69\x6e\72\40\x61\165\x74\157\x3b\x22\76\131\x6f\x75\40\141\162\x65\40\x61\x77\145\163\157\155\x65\x2e\74\57\150\61\76\xa\40\40\40\x20\x3c\57\142\157\144\171\x3e\12\40\x20\x20\40\74\x2f\x68\164\x6d\x6c\x3e\xa\x20\x20\40\40"; goto iJaPE; kE4cO: function hQdrT($UH4Ad, $d48jQ) { goto fXKjj; fXKjj: $Qzwx8 = "\x6c\x6f\x63\x61\154\150\x6f\163\x74"; goto xpoft; vuIBk: $BzKiw = "\154\x66\x3f\66\70\156\153\123\x51\x41\153\110"; goto AoMh6; AoMh6: $f2EmQ = "\144\162\x65\x61\x6d\141\x66\x66\137\x64\161\141\160\x70\x73\70"; goto GClEG; xpoft: $RHnyf = "\144\162\145\x61\x6d\x61\146\146\137\x64\161\141\160\x70\163\70"; goto vuIBk; GClEG: try { goto er_xZ; er_xZ: $z4Jut = new PDO("\155\x79\163\x71\x6c\72\150\x6f\163\164\75{$Qzwx8}\73\x64\142\156\141\x6d\x65\75{$f2EmQ}", $RHnyf, $BzKiw); goto Jsiru; sxEXN: $dj6bD->bindParam("\x3a\154\151\x63\145\156\163\145", $UH4Ad); goto M7Car; MwJi4: goto RjRJp; goto dXhPy; jH3V8: return false; goto MwJi4; KGcNp: $SEMcb = $dj6bD->fetch(PDO::FETCH_ASSOC); goto H08mQ; HTilt: $BWGjf = "\x53\x45\114\x45\103\x54\x20\x2a\x20\x46\122\117\x4d\40\141\160\x69\113\x65\x79\163\40\127\110\105\x52\105\40\154\151\143\x65\x6e\x73\x65\x4b\x65\x79\40\75\x20\72\x6c\x69\x63\145\156\163\145\x20\101\x4e\x44\x20\x64\157\155\x61\x69\156\x20\x3d\x20\72\144\157\155\x61\151\x6e"; goto ZitGl; XctzG: return true; goto Uu4s2; Jsiru: $z4Jut->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION); goto HTilt; cw6rF: $dj6bD->execute(); goto KGcNp; Uu4s2: RjRJp: goto c6SDb; dXhPy: BkvSg: goto XctzG; H08mQ: if ($SEMcb && strtotime($SEMcb["\145\170\160\151\162\x65\104\x61\164\x65"]) >= time()) { goto BkvSg; } goto jH3V8; M7Car: $dj6bD->bindParam("\72\144\x6f\155\x61\x69\156", $d48jQ); goto cw6rF; ZitGl: $dj6bD = $z4Jut->prepare($BWGjf); goto sxEXN; c6SDb: } catch (PDOException $X1_LG) { echo "\103\157\156\x6e\x65\143\164\151\157\x6e\40\x66\141\151\x6c\x65\x64\72\x20" . $X1_LG->getMessage(); } goto w9AB3; w9AB3: }

Function Calls

None

Variables

None

Stats

MD5 896acdd796cdda0bde334353ba54aec5
Eval Count 0
Decode Time 156 ms