Find this useful? Enter your email to receive occasional updates for securing PHP code.

Signing you up...

Thank you for signing up!

PHP Decode

<?php function mo_saml_admin_notices() { $ig = get_option("\x6d\157\x5f\x73\141..

Decoded Output download

<?php 
 
 
function mo_saml_admin_notices() 
{ 
    $ig = get_option("mo_saml_tla"); 
    $hN = get_option("mo_saml_license_expiry_date"); 
    if (!((!mo_saml_is_customer_license_key_verified() and empty(get_option("mo_saml_tla"))) || !mo_saml_is_customer_registered() || !$ig || empty($hN))) { 
        goto AMr; 
    } 
    return; 
    AMr: 
    echo "<br/>"; 
    if (new DateTime() < new DateTime($hN)) { 
        goto ARM; 
    } 
    echo "<div class="notice notice-error mo_saml_trial_notice_banner"><img src="" . SAMLSPUtilities::mo_saml_get_plugin_dir_url() . "images/miniorange.png"/>&nbsp;&nbsp;
\xa	\x9<span class="mo_saml_trial_notice_text"><b>Your TRIAL license for miniOrange SAML 2.0 Single Sign On plugin has been expired on " . $hN . ".</b>
\xa            <br/>Please <b><a href="https://plugins.miniorange.com/wordpress-single-sign-on-sso#pricing" target="_blank">purchase the plugin</a></b> or contact us at <a href="mailto:[email protected]" class="text-primary"><b>[email protected]</b></a>."; 
    goto xOQ; 
    ARM: 
    echo "<div class="notice notice-warning mo_saml_trial_notice_banner"><img src="" . SAMLSPUtilities::mo_saml_get_plugin_dir_url() . "images/miniorange.png"/>&nbsp;&nbsp;\xd\xa		<span class="mo_saml_trial_notice_text"><b>Your TRIAL license for miniOrange SAML 2.0 Single Sign On plugin has been activated and will be valid till " . $hN . ".</b>\xd
		<br/> If you need any help in setting up the SSO, please reach out to us at <a href="mailto:[email protected]" class="text-primary"><b>[email protected]</b></a>."; 
    xOQ: 
    echo "</span></div>"; 
} 
 ?>

Did this file decode correctly?

Original Code

<?php


function mo_saml_admin_notices()
{
    $ig = get_option("\x6d\157\x5f\x73\141\x6d\154\x5f\164\154\141");
    $hN = get_option("\x6d\x6f\137\163\x61\x6d\154\137\x6c\x69\143\145\156\x73\145\137\x65\170\x70\151\x72\171\x5f\x64\x61\164\x65");
    if (!((!mo_saml_is_customer_license_key_verified() and empty(get_option("\155\x6f\x5f\x73\x61\155\x6c\137\164\x6c\x61"))) || !mo_saml_is_customer_registered() || !$ig || empty($hN))) {
        goto AMr;
    }
    return;
    AMr:
    echo "\74\142\x72\x2f\76";
    if (new DateTime() < new DateTime($hN)) {
        goto ARM;
    }
    echo "\74\144\151\x76\40\x63\x6c\141\163\x73\x3d\42\156\157\164\x69\143\145\x20\x6e\x6f\x74\x69\x63\145\x2d\145\162\x72\x6f\162\40\155\157\137\163\x61\155\154\137\164\x72\x69\x61\154\137\x6e\x6f\164\151\143\x65\x5f\x62\141\x6e\x6e\x65\x72\x22\x3e\74\151\x6d\x67\x20\163\x72\x63\x3d\x22" . SAMLSPUtilities::mo_saml_get_plugin_dir_url() . "\x69\x6d\x61\x67\x65\x73\57\155\x69\156\x69\x6f\162\141\x6e\x67\x65\56\160\156\147\42\x2f\x3e\x26\x6e\x62\163\x70\73\46\x6e\x62\163\160\x3b\15\xa\11\x9\x3c\163\160\x61\156\x20\143\x6c\141\x73\x73\75\42\155\x6f\x5f\x73\141\x6d\154\137\164\x72\151\x61\x6c\x5f\x6e\x6f\x74\x69\x63\145\137\164\145\170\164\x22\76\x3c\142\x3e\x59\157\165\162\40\x54\x52\111\x41\x4c\x20\x6c\151\x63\145\156\163\x65\40\146\157\162\x20\155\151\156\151\x4f\162\141\156\x67\x65\40\123\101\x4d\x4c\40\x32\x2e\x30\x20\x53\151\156\x67\154\x65\x20\123\151\147\156\x20\x4f\x6e\40\160\x6c\x75\147\x69\x6e\40\x68\x61\163\40\x62\x65\x65\156\x20\x65\x78\160\x69\162\x65\144\x20\157\156\40" . $hN . "\x2e\74\x2f\142\x3e\15\xa\x20\40\x20\40\40\x20\x20\40\x20\x20\x20\x20\x3c\142\162\x2f\x3e\120\154\x65\x61\x73\x65\40\74\142\76\74\141\40\x68\x72\145\x66\x3d\42\150\164\164\x70\163\x3a\x2f\x2f\x70\x6c\165\147\151\156\163\56\x6d\x69\x6e\151\157\162\x61\x6e\147\145\56\x63\157\155\x2f\167\x6f\x72\144\x70\x72\145\163\163\x2d\163\151\156\147\154\145\x2d\x73\x69\147\156\x2d\157\x6e\x2d\163\x73\157\43\160\162\x69\x63\x69\x6e\x67\42\x20\x74\141\162\x67\x65\164\75\42\x5f\142\154\141\156\x6b\42\x3e\160\x75\x72\x63\x68\x61\x73\x65\x20\164\x68\145\40\x70\x6c\165\147\x69\x6e\x3c\x2f\x61\76\74\x2f\142\x3e\40\x6f\x72\x20\x63\157\x6e\x74\x61\x63\164\x20\165\163\40\x61\x74\x20\x3c\x61\x20\x68\162\145\x66\75\42\155\x61\x69\x6c\164\157\72\x73\x61\155\154\x73\165\x70\160\157\x72\x74\x40\x78\145\x63\165\x72\x69\146\x79\x2e\x63\x6f\x6d\x22\x20\x63\154\x61\163\x73\x3d\42\164\x65\170\164\x2d\x70\162\151\155\x61\162\171\x22\x3e\74\x62\76\x73\x61\155\x6c\x73\165\160\160\157\162\x74\100\170\x65\143\x75\x72\151\x66\x79\56\143\x6f\155\74\57\142\x3e\x3c\x2f\x61\x3e\x2e";
    goto xOQ;
    ARM:
    echo "\74\144\151\x76\x20\x63\x6c\x61\x73\163\x3d\x22\x6e\157\x74\151\143\x65\x20\156\x6f\x74\151\143\145\55\167\141\x72\156\151\156\x67\40\155\157\x5f\163\141\155\x6c\137\164\162\x69\x61\x6c\137\x6e\157\x74\x69\x63\x65\137\142\x61\x6e\x6e\145\x72\42\x3e\74\x69\155\147\40\163\x72\143\x3d\42" . SAMLSPUtilities::mo_saml_get_plugin_dir_url() . "\x69\155\x61\x67\145\163\x2f\x6d\x69\156\x69\157\x72\x61\156\147\145\x2e\160\x6e\x67\x22\57\76\46\x6e\142\x73\160\73\46\x6e\x62\x73\x70\73\xd\xa\11\11\x3c\x73\160\x61\x6e\40\143\x6c\141\x73\x73\75\42\x6d\157\137\163\141\155\154\x5f\164\162\151\141\x6c\137\156\x6f\164\151\143\145\x5f\x74\x65\x78\164\42\x3e\74\x62\x3e\x59\x6f\165\x72\40\x54\x52\x49\101\x4c\x20\x6c\x69\x63\x65\156\163\145\40\x66\157\162\40\155\151\156\x69\x4f\x72\x61\156\147\x65\x20\123\101\x4d\114\x20\62\x2e\60\40\x53\x69\156\147\154\x65\40\123\x69\x67\x6e\x20\117\156\40\160\x6c\x75\x67\x69\156\x20\150\x61\x73\x20\142\x65\x65\156\40\x61\x63\164\x69\166\x61\164\x65\x64\40\x61\x6e\144\x20\167\151\154\x6c\x20\x62\x65\40\x76\x61\x6c\x69\144\x20\x74\151\154\x6c\40" . $hN . "\x2e\x3c\57\x62\76\xd\12\11\11\74\x62\162\x2f\76\x20\111\146\40\171\x6f\165\x20\156\145\x65\144\40\x61\x6e\x79\x20\x68\x65\154\160\x20\x69\156\40\163\x65\x74\x74\x69\x6e\x67\x20\165\x70\x20\164\150\x65\x20\x53\x53\117\54\40\x70\x6c\145\141\163\x65\x20\162\145\141\x63\x68\40\x6f\x75\x74\x20\x74\157\40\165\x73\x20\x61\164\40\x3c\141\x20\x68\x72\145\146\x3d\x22\x6d\x61\151\x6c\164\x6f\72\163\x61\x6d\154\163\165\x70\x70\x6f\x72\164\x40\x78\x65\143\165\x72\151\146\171\56\143\x6f\155\x22\x20\x63\x6c\141\163\x73\75\42\164\145\170\x74\55\160\x72\x69\155\x61\162\171\42\x3e\74\x62\x3e\x73\x61\155\154\x73\165\x70\x70\x6f\162\x74\100\x78\x65\143\x75\162\x69\x66\x79\x2e\x63\157\x6d\74\57\142\76\74\57\141\76\x2e";
    xOQ:
    echo "\x3c\57\x73\x70\141\x6e\x3e\x3c\x2f\144\x69\x76\76";
}

Function Calls

None

Variables

None

Stats

MD5 fd6673bc924b9c7faafc0138c8a9c4f5
Eval Count 0
Decode Time 44 ms