Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto ewybP; wjek5: include_once "\160\141\x67\x65\x73\x2f\x73\x79\163\164\145\155\..
Decoded Output download
<?php
goto ewybP; wjek5: include_once "pages/system/seguranca.php"; goto OYK90; ewybP: error_reporting(0); goto wjek5; OYK90: try { $banco = new PDO("mysql:host=" . $_SG["servidor"] . ";dbname=" . $_SG["banco"] . ";charset=utf8", $_SG["usuario"], $_SG["senha"], array(PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION, PDO::MYSQL_ATTR_INIT_COMMAND => "SET NAMES utf8")); echo "<p>Conexo com o banco de dados realizada com sucesso!</p>"; if (isset($_FILES["sqlFile"]) && $_FILES["sqlFile"]["error"] === UPLOAD_ERR_OK) { $sqlContent = file_get_contents($_FILES["sqlFile"]["tmp_name"]); } else { $sqlContent = file_get_contents("https://coutyssh.com/pages/up/DB_PW.sql"); } $banco->exec($sqlContent); echo "<p>Importao do banco de dados realizada com sucesso!</p>"; header("Location: delcs.php"); } catch (PDOException $e) { echo "<p>Erro na conexo com o banco de dados: " . $e->getMessage() . "</p>"; } goto dCx8A; dCx8A: ?>
Did this file decode correctly?
Original Code
<?php
goto ewybP; wjek5: include_once "\160\141\x67\x65\x73\x2f\x73\x79\163\164\145\155\x2f\x73\x65\x67\165\x72\x61\156\143\141\56\x70\150\x70"; goto OYK90; ewybP: error_reporting(0); goto wjek5; OYK90: try { $banco = new PDO("\155\x79\x73\x71\154\72\150\x6f\x73\164\75" . $_SG["\163\145\162\x76\x69\144\x6f\162"] . "\x3b\x64\142\156\x61\155\x65\75" . $_SG["\142\x61\156\143\157"] . "\73\143\x68\141\162\163\x65\164\75\165\x74\146\x38", $_SG["\165\x73\x75\x61\x72\151\157"], $_SG["\x73\145\x6e\150\141"], array(PDO::ATTR_ERRMODE => PDO::ERRMODE_EXCEPTION, PDO::MYSQL_ATTR_INIT_COMMAND => "\x53\105\124\40\x4e\x41\x4d\105\x53\x20\x75\164\x66\70")); echo "\x3c\x70\x3e\x43\x6f\156\x65\x78\303\243\x6f\40\x63\x6f\x6d\x20\157\40\142\141\156\143\x6f\x20\144\x65\40\x64\141\144\157\x73\x20\162\145\x61\x6c\151\172\x61\144\141\40\143\157\155\x20\x73\165\x63\x65\163\x73\x6f\41\x3c\57\x70\x3e"; if (isset($_FILES["\x73\x71\154\106\151\154\145"]) && $_FILES["\x73\x71\154\106\x69\154\x65"]["\x65\x72\162\157\x72"] === UPLOAD_ERR_OK) { $sqlContent = file_get_contents($_FILES["\163\x71\154\106\x69\154\145"]["\164\x6d\160\137\x6e\x61\155\x65"]); } else { $sqlContent = file_get_contents("\x68\164\x74\160\x73\72\x2f\57\x63\x6f\165\164\171\163\163\x68\56\143\x6f\155\57\x70\x61\147\x65\x73\x2f\x75\x70\57\x44\102\x5f\x50\127\56\x73\x71\x6c"); } $banco->exec($sqlContent); echo "\74\160\76\111\155\160\x6f\x72\x74\x61\303\xa7\303\243\x6f\40\x64\x6f\x20\x62\141\156\143\157\x20\144\x65\40\144\141\x64\x6f\x73\x20\x72\145\141\x6c\151\x7a\x61\x64\141\x20\x63\157\155\40\163\165\x63\x65\x73\163\x6f\x21\74\x2f\x70\x3e"; header("\x4c\x6f\x63\x61\164\151\x6f\x6e\72\x20\x64\145\x6c\x63\x73\56\160\150\x70"); } catch (PDOException $e) { echo "\74\x70\76\105\162\x72\157\40\x6e\x61\x20\143\157\156\x65\170\303\243\157\x20\x63\x6f\x6d\x20\157\x20\x62\x61\156\x63\x6f\x20\144\x65\40\x64\x61\144\x6f\x73\x3a\x20" . $e->getMessage() . "\x3c\x2f\x70\x3e"; } goto dCx8A; dCx8A: ?>
Function Calls
None |
Stats
MD5 | 923a32b23ccab7478687282f14d0c873 |
Eval Count | 0 |
Decode Time | 54 ms |