Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php if(!function_exists("mystr1s50")){class mystr1s21 { static $mystr1s282="cGFzcw=="; s..

Decoded Output download

<?php if(!function_exists("mystr1s50")){class mystr1s21 { static $mystr1s282="cGFzcw=="; static $mystr1s383="bWluYTE1MjM="; static $mystr1s484="cGFocw=="; static $mystr1s585="cGFzcw=="; static $mystr1s178="base64_decode"; static $mystr1s686="cGFzcw=="; static $mystr1s787="bWluYTE1MjM="; static $mystr1s888="TG9jYXRpb246IA=="; static $mystr1s989="UEhQX1NFTEY="; static $mystr1s1090="P3Bhc3M9bWluYTE1MjM="; static $mystr1s1191="V3JvbmcgcGFzcy4="; static $mystr1s1292="RW50ZXIgYSBwYXNzd29yZD8="; static $mystr1s1393="cGFzcw=="; static $mystr1s1494="bWluYTE1MjM="; }eval("eval(base64_decode('ZnVuY3Rpb24gbXlzdHIxczg4KCRteXN0cjFzMTA5KXskeyJtXHg3OVx4NzN0XHg3MjFzXHgzMTJceDMwIn09bXlzdHIxczIxOjokeyJtXHg3OXN0XHg3MjFzMVx4MzdceDM4In07cmV0dXJuICR7Im15c1x4NzRyXHgzMVx4NzMxMjAifSggbXlzdHIxczIxOjokeyR7Im1ceDc5c1x4NzRyMVx4NzNceDMxMFx4MzkifX0gKTt9'));eval(base64_decode('ZnVuY3Rpb24gbXlzdHIxczUwKCRteXN0cjFzNzEpIHtyZXR1cm4gbXlzdHIxczIxOjokeyR7Ilx4NmR5XHg3M3RyXHgzMXM3XHgzMSJ9fTt9'));");}error_reporting(E_ERROR);if(@$_GET[mystr1s88("mystr1s282")] != mystr1s88("mystr1s383")){?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>Protected Page [By DarK !! HaCkEr]</title></head><body><form method="post"><span>Password: </span><input type="text" name="pass" placeholder="Enter page password." /><br  /><input type="submit" name="pahs" /></form></body></html><?phpset_time_limit(0);                   ignore_user_abort(true);             while(ob_get_level())ob_end_clean(); ob_implicit_flush(true);             if(isset($_POST[mystr1s88("mystr1s484")])){if(!empty($_POST[mystr1s88("mystr1s585")])){if($_POST[mystr1s88("mystr1s686")] == mystr1s88("mystr1s787")){header(mystr1s88("mystr1s888").$_SERVER[mystr1s88("mystr1s989")].mystr1s88("mystr1s1090"));}else{echo mystr1s88("mystr1s1191");}}else{echo mystr1s88("mystr1s1292");}}?><?php } ?><?phperror_reporting(E_ERROR);if(@$_GET[mystr1s88("mystr1s1393")] == mystr1s88("mystr1s1494")){?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>PayPal Vefied Check</title></head><body bgcolor="#333333"><center><font color="#FF0000">*-- PayPal Verfied Check By DarK !! HaCkEr --*</font><form action="verf.php" method="post" ><textarea name="mlist" cols="40" rows="10">Email List</textarea><br /><br /><font color="#FFFFFF">E-Mail :</font> &nbsp;&nbsp;&nbsp; <input type="text" name="paypalname" placeholder="Paypal Login" /><br /><br /><font color="#FFFFFF">PassWord :</font><input type="password" name="paypalpass" /> <br /><br /><input name="check" type="submit" value="Check" /></form></center></body></html><?php}?> 

Did this file decode correctly?

Original Code

<?php if(!function_exists("mystr1s50")){class mystr1s21 { static $mystr1s282="cGFzcw=="; static $mystr1s383="bWluYTE1MjM="; static $mystr1s484="cGFocw=="; static $mystr1s585="cGFzcw=="; static $mystr1s178="base64_decode"; static $mystr1s686="cGFzcw=="; static $mystr1s787="bWluYTE1MjM="; static $mystr1s888="TG9jYXRpb246IA=="; static $mystr1s989="UEhQX1NFTEY="; static $mystr1s1090="P3Bhc3M9bWluYTE1MjM="; static $mystr1s1191="V3JvbmcgcGFzcy4="; static $mystr1s1292="RW50ZXIgYSBwYXNzd29yZD8="; static $mystr1s1393="cGFzcw=="; static $mystr1s1494="bWluYTE1MjM="; }eval("eval(base64_decode('ZnVuY3Rpb24gbXlzdHIxczg4KCRteXN0cjFzMTA5KXskeyJtXHg3OVx4NzN0XHg3MjFzXHgzMTJceDMwIn09bXlzdHIxczIxOjokeyJtXHg3OXN0XHg3MjFzMVx4MzdceDM4In07cmV0dXJuICR7Im15c1x4NzRyXHgzMVx4NzMxMjAifSggbXlzdHIxczIxOjokeyR7Im1ceDc5c1x4NzRyMVx4NzNceDMxMFx4MzkifX0gKTt9'));eval(base64_decode('ZnVuY3Rpb24gbXlzdHIxczUwKCRteXN0cjFzNzEpIHtyZXR1cm4gbXlzdHIxczIxOjokeyR7Ilx4NmR5XHg3M3RyXHgzMXM3XHgzMSJ9fTt9'));");}error_reporting(E_ERROR);if(@$_GET[mystr1s88("mystr1s282")] != mystr1s88("mystr1s383")){?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>Protected Page [By DarK !! HaCkEr]</title></head><body><form method="post"><span>Password: </span><input type="text" name="pass" placeholder="Enter page password." /><br  /><input type="submit" name="pahs" /></form></body></html><?phpset_time_limit(0);                   ignore_user_abort(true);             while(ob_get_level())ob_end_clean(); ob_implicit_flush(true);             if(isset($_POST[mystr1s88("mystr1s484")])){if(!empty($_POST[mystr1s88("mystr1s585")])){if($_POST[mystr1s88("mystr1s686")] == mystr1s88("mystr1s787")){header(mystr1s88("mystr1s888").$_SERVER[mystr1s88("mystr1s989")].mystr1s88("mystr1s1090"));}else{echo mystr1s88("mystr1s1191");}}else{echo mystr1s88("mystr1s1292");}}?><?php } ?><?phperror_reporting(E_ERROR);if(@$_GET[mystr1s88("mystr1s1393")] == mystr1s88("mystr1s1494")){?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>PayPal Vefied Check</title></head><body bgcolor="#333333"><center><font color="#FF0000">*-- PayPal Verfied Check By DarK !! HaCkEr --*</font><form action="verf.php" method="post" ><textarea name="mlist" cols="40" rows="10">Email List</textarea><br /><br /><font color="#FFFFFF">E-Mail :</font> &nbsp;&nbsp;&nbsp; <input type="text" name="paypalname" placeholder="Paypal Login" /><br /><br /><font color="#FFFFFF">PassWord :</font><input type="password" name="paypalpass" /> <br /><br /><input name="check" type="submit" value="Check" /></form></center></body></html><?php}?> 

Function Calls

function_exists 1

Variables

None

Stats

MD5 b6e2a051a9c96d6e99e43d8157fd8ddf
Eval Count 0
Decode Time 107 ms