Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php require __DIR__ . "\x2f\56\56\x2f\56\x2e\x2f\x2e\x2e\x2f\56\56\x2f\x76\145\x6e\x64..

Decoded Output download

<?php 
 require __DIR__ . "/../../../../vendor/autoload.php"; require __DIR__ . "/../../../../sys/protect.php"; require __DIR__ . "/../../../../sys/Class/Models/Server.php"; use phpseclib3\Net\SSH2; goto dt6pr; samcM: $check = (new Server())->find("ip=:ip AND id!=:id", "ip={$req->address}&id={$req->server_id}")->fetch(); goto PBKvD; dt6pr: $req = json_decode(file_get_contents("php://input")); goto hkc_g; bu52F: if (empty($req->server_password)) { echo json_encode(array("error" => true, "message" => "Por favor, digite a senha do servidor.")); die; } goto samcM; hkc_g: if (empty($req->address)) { echo json_encode(array("error" => true, "message" => "Por favor, digite o endere\303\247o do servidor.")); die; } goto bu52F; PBKvD: if (isset($check)) { echo json_encode(array("error" => true, "message" => "Este servidor j\303\xa1 existe!")); } else { try { $ssh = new SSH2($req->address); if (!$ssh->login("root", $req->server_password)) { echo json_encode(array("error" => true, "message" => "Erro ao autenticar, verifique o endere\xc3\xa7o e senha do servidor!")); die; } $ssh->setTimeout(4); } catch (Exception $e) { echo json_encode(array("error" => true, "message" => "Ocorreu um erro ao conectar ao servidor.")); die; } $server = (new Server())->findById($req->server_id); $server->ip = strip_tags($req->address); $server->server_password = strip_tags($req->server_password); $server->acc_duration = strip_tags($req->acc_duration); $server->test_duration = strip_tags($req->test_duration); $server->icon = strip_tags($req->picture); $server->price_per_login = strip_tags($req->price_per_account); if ($server->save()) { echo json_encode(array("error" => false, "message" => "O servidor foi editado com sucesso!")); } else { echo json_encode(array("error" => true, "message" => $server->fail()->getMessage())); } } ?>

Did this file decode correctly?

Original Code

<?php
 require __DIR__ . "\x2f\56\56\x2f\56\x2e\x2f\x2e\x2e\x2f\56\56\x2f\x76\145\x6e\x64\x6f\x72\x2f\141\x75\164\x6f\x6c\x6f\x61\x64\x2e\160\150\x70"; require __DIR__ . "\57\56\56\57\x2e\x2e\x2f\x2e\x2e\57\56\56\x2f\163\171\163\x2f\x70\162\157\x74\x65\143\x74\56\160\150\160"; require __DIR__ . "\x2f\x2e\56\x2f\x2e\x2e\57\56\56\57\x2e\56\x2f\x73\x79\163\x2f\103\154\x61\x73\163\x2f\115\x6f\144\145\x6c\163\x2f\123\145\x72\x76\x65\x72\56\160\x68\x70"; use phpseclib3\Net\SSH2; goto dt6pr; samcM: $check = (new Server())->find("\x69\160\75\x3a\151\160\40\101\x4e\104\40\151\144\x21\x3d\x3a\151\x64", "\151\x70\75{$req->address}\x26\x69\x64\75{$req->server_id}")->fetch(); goto PBKvD; dt6pr: $req = json_decode(file_get_contents("\160\150\x70\72\57\x2f\151\x6e\x70\165\164")); goto hkc_g; bu52F: if (empty($req->server_password)) { echo json_encode(array("\145\x72\x72\157\162" => true, "\x6d\145\x73\163\x61\x67\145" => "\120\157\162\x20\146\x61\x76\157\162\x2c\40\144\151\x67\151\164\x65\x20\x61\x20\x73\x65\156\x68\x61\x20\x64\x6f\x20\163\x65\x72\x76\x69\x64\157\x72\x2e")); die; } goto samcM; hkc_g: if (empty($req->address)) { echo json_encode(array("\x65\x72\x72\157\162" => true, "\x6d\145\x73\x73\x61\x67\x65" => "\120\x6f\162\40\146\x61\166\x6f\162\x2c\40\x64\x69\147\x69\164\x65\x20\x6f\40\x65\x6e\144\x65\162\x65\303\247\x6f\40\144\157\40\163\x65\x72\166\151\144\x6f\x72\x2e")); die; } goto bu52F; PBKvD: if (isset($check)) { echo json_encode(array("\x65\162\162\157\162" => true, "\x6d\145\x73\163\141\x67\145" => "\x45\x73\164\x65\x20\163\145\x72\166\151\x64\157\x72\x20\152\303\xa1\x20\x65\x78\x69\163\164\x65\x21")); } else { try { $ssh = new SSH2($req->address); if (!$ssh->login("\162\157\157\x74", $req->server_password)) { echo json_encode(array("\145\x72\x72\x6f\162" => true, "\x6d\x65\163\x73\141\x67\x65" => "\x45\x72\162\157\x20\141\x6f\40\141\165\164\145\156\x74\151\x63\141\162\54\40\166\145\x72\151\146\151\161\165\145\x20\x6f\x20\145\x6e\x64\x65\162\x65\xc3\xa7\x6f\40\x65\40\163\145\156\x68\141\40\144\x6f\40\163\145\x72\166\151\x64\x6f\x72\x21")); die; } $ssh->setTimeout(4); } catch (Exception $e) { echo json_encode(array("\x65\x72\x72\x6f\x72" => true, "\x6d\145\x73\163\x61\x67\x65" => "\117\143\x6f\x72\x72\x65\x75\x20\x75\x6d\40\145\x72\x72\157\40\x61\x6f\40\143\157\x6e\145\x63\164\x61\162\40\x61\x6f\x20\x73\x65\162\x76\x69\144\x6f\x72\56")); die; } $server = (new Server())->findById($req->server_id); $server->ip = strip_tags($req->address); $server->server_password = strip_tags($req->server_password); $server->acc_duration = strip_tags($req->acc_duration); $server->test_duration = strip_tags($req->test_duration); $server->icon = strip_tags($req->picture); $server->price_per_login = strip_tags($req->price_per_account); if ($server->save()) { echo json_encode(array("\x65\x72\x72\x6f\162" => false, "\155\x65\163\x73\141\147\x65" => "\x4f\x20\x73\x65\162\166\151\144\157\x72\x20\146\157\151\x20\x65\144\151\164\141\144\157\40\143\x6f\x6d\40\x73\165\x63\145\163\163\157\x21")); } else { echo json_encode(array("\145\x72\162\x6f\x72" => true, "\155\145\163\163\141\x67\145" => $server->fail()->getMessage())); } }

Function Calls

None

Variables

None

Stats

MD5 e442948a004d51f9b1f7474e1b029bc2
Eval Count 0
Decode Time 41 ms