Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto IcsrA; XkFxN: header("\x43\x6f\156\164\x65\x6e\x74\55\124\x79\x70\x65\72\40\x6..
Decoded Output download
<?php
goto IcsrA; XkFxN: header("Content-Type: application/json"); goto RnNSq; FKuZW: try { goto jeYqK; im26t: http_response_code(401); goto ixTgB; HAitz: $WUNrS = $aoRKk->prepare($QXZ08); goto GA1ky; VwMG_: $Y2Rh7 = $f1GkL["X-API-KEY"]; goto HAitz; O8Y3P: $f1GkL = apache_request_headers(); goto VwMG_; pwpp1: yLa9M: goto vwBc_; uXjIN: goto yLa9M; goto yKBXr; Wn6nc: http_response_code(200); goto KdbZ4; jeYqK: $Gbh7r = base64_decode("ADEAMgA3AC4AMAAuADAALgAx"); goto eWL6_; GA1ky: $WUNrS->bind_param("s", $Y2Rh7); goto fpIHi; KdbZ4: $KCcV1 = ["status" => "success", "message" => "data anda berhasil direseteeee"]; goto pwpp1; eFP40: if ($Uewu0 === true) { goto OCsEA; } goto im26t; ixTgB: $KCcV1 = ["status" => "Unauthorized Access", "message" => "Mohon periksa api key anda"]; goto uXjIN; yKBXr: OCsEA: goto Wn6nc; vgtO6: $aoRKk = mysqli_connect($q1N6K, "root", '', "rkxcpixce4ozkxfd7kgctrcrwt5eknc7"); goto O8Y3P; eWL6_: $QXZ08 = base64_decode("VVBEQVRFIG9pZ2Fnd3QyaXFxN2FuNzJod2w4bWt0Z2o2enZnaDNqIFNFVCBlZUFCcTlKYjdodXVSNHBaZFQ3VGp1dHhDMnEwNEtYZiA9ICctJywgczE4aGVaSmVjZkQxejM0dUprM0JyQ1NvV0pFT2RuT0MgPSAnMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCwwLDAsMCcgd2hlcmUgbFlMd1NVdzFsZU1ld2lHTG1KMElnMFFMeEhCUm5QdzAgID0gPw=="); goto vgtO6; fpIHi: $Uewu0 = $WUNrS->execute(); goto eFP40; vwBc_: } catch (mysqli_sql_exception $MET67) { http_response_code(500); $KCcV1 = ["status" => "Internal Server Error", "message" => "Mohon coba beberapa saat lagi"]; } goto XkFxN; zU4kb: echo json_encode($KCcV1); goto OM4Zk; sfbB9: http_response_code(405); goto RCQCP; VnEZq: ini_set("display_errors", 0); goto qr2v6; OM4Zk: return false; goto HaPQT; ESfyD: error_reporting(E_ALL ^ E_NOTICE); goto VnEZq; HaPQT: Vi8oj: goto ESfyD; IcsrA: if (!($_SERVER["REQUEST_METHOD"] !== "DELETE")) { goto Vi8oj; } goto sfbB9; qr2v6: include "connect.php"; goto FKuZW; RCQCP: $KCcV1 = ["status" => "Method Not Allowed", "message" => "Your HTTP method is not allowed by the server"]; goto zU4kb; RnNSq: echo json_encode($KCcV1); goto CgHig; CgHig: $aoRKk->close();
?>
Did this file decode correctly?
Original Code
<?php
goto IcsrA; XkFxN: header("\x43\x6f\156\164\x65\x6e\x74\55\124\x79\x70\x65\72\40\x61\x70\160\x6c\x69\x63\x61\x74\151\157\x6e\57\152\x73\157\156"); goto RnNSq; FKuZW: try { goto jeYqK; im26t: http_response_code(401); goto ixTgB; HAitz: $WUNrS = $aoRKk->prepare($QXZ08); goto GA1ky; VwMG_: $Y2Rh7 = $f1GkL["\x58\55\101\x50\x49\55\113\x45\x59"]; goto HAitz; O8Y3P: $f1GkL = apache_request_headers(); goto VwMG_; pwpp1: yLa9M: goto vwBc_; uXjIN: goto yLa9M; goto yKBXr; Wn6nc: http_response_code(200); goto KdbZ4; jeYqK: $Gbh7r = base64_decode("\x41\x44\x45\x41\115\147\x41\63\101\103\x34\x41\115\x41\101\165\x41\x44\x41\101\x4c\147\x41\170"); goto eWL6_; GA1ky: $WUNrS->bind_param("\x73", $Y2Rh7); goto fpIHi; KdbZ4: $KCcV1 = ["\x73\164\x61\164\165\x73" => "\x73\165\x63\x63\145\163\x73", "\155\x65\x73\x73\x61\x67\145" => "\144\141\x74\141\40\x61\x6e\144\141\40\142\145\162\x68\141\163\151\x6c\40\144\x69\x72\145\x73\x65\164\145\x65\145\x65"]; goto pwpp1; eFP40: if ($Uewu0 === true) { goto OCsEA; } goto im26t; ixTgB: $KCcV1 = ["\x73\x74\141\x74\165\x73" => "\x55\x6e\141\165\x74\x68\157\162\151\x7a\x65\144\40\x41\143\143\x65\x73\x73", "\x6d\145\163\x73\141\x67\145" => "\x4d\x6f\x68\157\x6e\40\x70\x65\162\x69\x6b\x73\141\x20\x61\160\151\40\153\x65\x79\40\141\156\x64\141"]; goto uXjIN; yKBXr: OCsEA: goto Wn6nc; vgtO6: $aoRKk = mysqli_connect($q1N6K, "\162\x6f\x6f\164", '', "\162\x6b\x78\x63\x70\151\170\143\145\x34\157\x7a\x6b\x78\146\x64\x37\x6b\147\x63\164\162\x63\x72\x77\x74\x35\145\x6b\x6e\x63\67"); goto O8Y3P; eWL6_: $QXZ08 = base64_decode("\x56\x56\102\105\121\x56\x52\106\x49\107\71\x70\x5a\62\106\156\144\x33\121\171\141\x58\106\170\116\62\x46\165\x4e\x7a\x4a\157\x64\62\167\64\x62\127\164\60\132\62\157\62\x65\156\132\x6e\x61\x44\x4e\x71\111\106\x4e\106\126\x43\102\x6c\132\125\x46\x43\143\x54\154\x4b\131\x6a\144\x6f\144\x58\x56\x53\116\x48\102\141\x5a\106\121\63\x56\x47\x70\61\144\x48\x68\104\x4d\x6e\105\167\x4e\105\164\x59\x5a\x69\101\71\x49\103\x63\x74\x4a\171\167\x67\x63\x7a\105\x34\141\107\126\x61\123\155\x56\152\x5a\153\x51\170\x65\152\115\60\x64\x55\160\x72\x4d\60\112\x79\x51\x31\116\x76\x56\x30\160\106\124\62\122\165\124\x30\115\147\x50\x53\x41\x6e\115\x43\x77\167\x4c\x44\101\x73\115\103\x77\x77\x4c\104\x41\x73\x4d\103\x77\x77\x4c\104\x41\163\x4d\103\x77\x77\x4c\x44\101\x73\115\x43\167\x77\x4c\104\x41\163\x4d\x43\167\x77\114\x44\x41\163\x4d\x43\x77\167\114\104\x41\163\x4d\x43\167\167\x4c\x44\x41\x73\x4d\103\x77\x77\x4c\104\101\163\x4d\103\167\x77\x4c\x44\101\163\x4d\x43\x77\167\x4c\x44\x41\x73\x4d\103\167\x77\114\104\x41\x73\x4d\103\167\167\x4c\104\101\x73\x4d\x43\x77\x77\x4c\104\x41\163\115\x43\167\167\x4c\x44\x41\x73\x4d\103\x77\167\x4c\x44\101\x73\115\x43\167\167\x4c\104\x41\x73\115\x43\x77\x77\x4c\x44\x41\163\115\x43\167\167\114\x44\x41\x73\115\x43\x77\x77\114\x44\101\x73\115\103\167\x77\114\104\101\x73\115\x43\143\x67\144\62\150\x6c\x63\x6d\x55\x67\142\106\154\x4d\144\61\116\126\x64\172\x46\163\x5a\125\61\x6c\144\62\x6c\x48\124\x47\61\x4b\115\x45\x6c\156\115\106\x46\115\x65\105\150\103\125\x6d\x35\121\144\172\101\x67\111\104\x30\x67\x50\167\75\75"); goto vgtO6; fpIHi: $Uewu0 = $WUNrS->execute(); goto eFP40; vwBc_: } catch (mysqli_sql_exception $MET67) { http_response_code(500); $KCcV1 = ["\163\164\141\x74\x75\x73" => "\x49\x6e\164\x65\162\156\141\154\40\x53\x65\162\x76\145\x72\x20\x45\x72\x72\157\162", "\155\x65\163\x73\141\147\x65" => "\x4d\157\150\x6f\x6e\40\143\157\x62\x61\40\142\x65\142\x65\162\141\x70\x61\40\163\x61\x61\x74\x20\154\x61\x67\151"]; } goto XkFxN; zU4kb: echo json_encode($KCcV1); goto OM4Zk; sfbB9: http_response_code(405); goto RCQCP; VnEZq: ini_set("\x64\x69\x73\x70\x6c\x61\171\137\145\162\162\x6f\x72\163", 0); goto qr2v6; OM4Zk: return false; goto HaPQT; ESfyD: error_reporting(E_ALL ^ E_NOTICE); goto VnEZq; HaPQT: Vi8oj: goto ESfyD; IcsrA: if (!($_SERVER["\122\x45\121\x55\x45\123\x54\137\115\105\x54\x48\117\104"] !== "\104\105\114\105\x54\105")) { goto Vi8oj; } goto sfbB9; qr2v6: include "\x63\x6f\156\156\x65\x63\x74\x2e\160\x68\160"; goto FKuZW; RCQCP: $KCcV1 = ["\x73\164\x61\164\x75\163" => "\115\x65\164\150\x6f\144\40\x4e\x6f\164\40\101\x6c\154\157\x77\145\x64", "\x6d\x65\163\x73\141\147\145" => "\131\x6f\x75\x72\40\x48\124\124\x50\40\155\145\164\150\157\144\x20\151\163\40\156\157\164\40\x61\154\154\157\x77\x65\x64\x20\142\171\40\x74\150\145\40\163\145\162\x76\145\162"]; goto zU4kb; RnNSq: echo json_encode($KCcV1); goto CgHig; CgHig: $aoRKk->close();
?>
Function Calls
None |
Stats
MD5 | 9d82703baf0c9405cb636120464c78dd |
Eval Count | 0 |
Decode Time | 51 ms |