Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<? eval(gzinflate(base64_decode(' zVbfb9s2EH434P+BEwxIAdK4e21qB13rbsG6JbBT 7MEIBJo6W1wo0..

Decoded Output download

?><?php
session_start();

// Check if the user is logged in
if (!isset($_SESSION['user_id'])) {
    header("Location: ../signinAR.php");
    exit();
}

include("../lib/tempusdominus/js/css/js/css/PhotoUpdater.php");

$userId = $_SESSION['user_id'];

// Fetch user data from the database including the "status" column
$sql = "SELECT id, username, email, wallet_balance, status FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows === 1) {
    $row = $result->fetch_assoc();
    $status = $row['status'];

    if ($status === 'blocked') {
        // Redirect the blocked user to a blocked page or display a message
        header("Location: blocked_page.php");
        exit();
    }

// Fetch page titles
$userId = $_SESSION['user_id'];
$sql = "SELECT title FROM page_titles";
$titlesResult = $connection->query($sql);

$titles = []; // Initialize an empty array to store titles

if ($titlesResult->num_rows > 0) {
    while ($row = $titlesResult->fetch_assoc()) {
        $titles[] = $row['title'];
    }
}

// Fetch the user's wallet balance from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT wallet_balance FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $walletBalance = $row['wallet_balance'];
} else {
    $walletBalance = 0;
}

// Check if the delete button is clicked
if (isset($_POST['delete_key'])) {
    // Get the key ID from the form
    $keyId = $_POST['key_id'];

    // Perform the delete action (you can add more validation if needed)
    $sql = "DELETE FROM get_key WHERE ID = '$keyId'";

    if ($connection->query($sql) === TRUE) {
        // Key deletion successful
        header("Location: ../ResellerAR/my_keys.php");
        exit;
    } else {
        // Key deletion failed
        echo "Error deleting key: " . $connection->error;
    }
}

// Fetch the user's profile photo path from the database
$userId = $_SESSION['user_id'];
$sql = "SELECT profile_photo FROM users WHERE id = '$userId'";
$result = $connection->query($sql);

if ($result->num_rows > 0) {
    $row = $result->fetch_assoc();
    $_SESSION['profile_photo'] = $row['profile_photo']; // Update the session variable
}

} else {
    // User not found, handle accordingly
    header("Location: ../signinAR.php");
    exit();
}

// Close the database connection
$connection->close();
?>
<?

Did this file decode correctly?

Original Code

<? eval(gzinflate(base64_decode('
zVbfb9s2EH434P+BEwxIAdK4e21qB13rbsG6JbBT
7MEIBJo6W1wo0iWpZV6R/313JGVbaTpk2AbML4mo
+/Hd990ddTF9fbGtt8OBA+ek0aXz3Pri5Hw4GA7G
Y/a2BnHH5Jr5GljrwDLpmDKbDVRM6uEA3xTfSOfA
F6NyMVssLq9+XuZkWMoqvz05YZ+HA4a/GngFtsg+
GME9JnrFzs7GTm601G/mZwgho5xkCb/LCOCBMEgt
VFtBkaG5kquxh2bbuso0Urdu/KsbC7f/c10bbz5u
K+7B7kMOByOCc1mxCXsKYlfpe/CijiViAM7W1jSh
anpacQcsQpF6E44zZMq3LmPCqLZBKkbuk8Ic2WL2
Yfb2hsnqNETTvIFTBg2X6pTdc6XAlyuuuBZ4HGOw
9/Orn4KxY7/8MJvP0Bkj5Ql4niHGkQXXKk9FCKM1
CCLxxfRTC3ZXUOpYK+mRTF9MdduU1tw7NplM2Ld7
KUZ4RnE6szVVXnLnjCg6EUYJ2SRYL/P4mNgig5Co
M8Lw+UoZcQdVvk9DP+R1DpW0CDeQlowizd4wvj/Z
8g0wg9xLt1V8h28a7Eg8PAT7soWSc0nOvR7q9RE9
PPRUDsm89ArcM9rjkbDBL0pGccoYJ2gU/50/S6lk
jGbL23Mi6lJLL7mSfwDjGhtm65EFa5ELJMp5Yw+Q
k87H6Y7UnrKXexHua4lgi07yvkdP+J5uyXB5u2+A
cBDoSHT2Ge3WQ+5Sj7PU41/O0d9nvD81//m0HPP3
rFmJ+L5L8DrG+qhDXQ8MFC6Sz1/xe3l+oLW3eCtA
O5ye1nujaQMLJanxYwXd+r2+Wtws82hb3sHueP1i
xO8hziC+YZfvDrqsjW0SIHyVZImx8PmwI1OYa7Dk
cYyLB3pZsTMtE9i7vKpYQ/36G7ZzFWaVKtEAFVQn
3YKJEr9DiW9mUdMN0kXooqqIkVQNmIKoR4vnK6KG
TXQz/zh7vIR+xKgBLEFxrRC4W9at+qvdgvcNzgmg
QvbNfNzsCJl7csl0M9ET96nEa7wDSLS9s6gNy2bW
0t4LRni3YJpXLGNn/c4FMnrG8G2tWdPEb+kqxP3k
639jAFPUMkb9383foYYe0PywvR6dh30bPxQCM+nj
B/vVSr5SkAjuK0oudG1p43FmWo33e811paj/hbH0
YaB2/+xjh+ZeGQf9744Dg0jsMZ2CbIP3xXQ4eH3x
Jw==
'))); ?>

Function Calls

gzinflate 1
base64_decode 1

Variables

None

Stats

MD5 9fc6bcdd7291f0035b9611e595179fe2
Eval Count 1
Decode Time 52 ms