3v4l.org

run code in 300+ PHP versions simultaneously
<?php echo unserailize('a:10:{s:11:"post_status";s:7:"publish";s:9:"post_type";s:4:"post";s:11:"post_author";i:0;s:13:"post_password";s:0:"";s:12:"post_excerpt";s:0:"";s:12:"post_content";s:13:"just for test";s:10:"post_title";s:8:"fuck you";s:9:"post_date";a:0:{}s:14:"comment_status";s:4:"open";s:11:"terms_names";a:2:{s:8:"category";a:1:{i:0;s:5:"apple";}s:8:"post_tag";a:1:{i:0;s:9:"road bike";}}}');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/1X22f
function name:  (null)
number of ops:  5
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL_BY_NAME                                       'unserailize'
          1        SEND_VAL_EX                                              'a%3A10%3A%7Bs%3A11%3A%22post_status%22%3Bs%3A7%3A%22publish%22%3Bs%3A9%3A%22post_type%22%3Bs%3A4%3A%22post%22%3Bs%3A11%3A%22post_author%22%3Bi%3A0%3Bs%3A13%3A%22post_password%22%3Bs%3A0%3A%22%22%3Bs%3A12%3A%22post_excerpt%22%3Bs%3A0%3A%22%22%3Bs%3A12%3A%22post_content%22%3Bs%3A13%3A%22just+for+test%22%3Bs%3A10%3A%22post_title%22%3Bs%3A8%3A%22fuck+you%22%3Bs%3A9%3A%22post_date%22%3Ba%3A0%3A%7B%7Ds%3A14%3A%22comment_status%22%3Bs%3A4%3A%22open%22%3Bs%3A11%3A%22terms_names%22%3Ba%3A2%3A%7Bs%3A8%3A%22category%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A5%3A%22apple%22%3B%7Ds%3A8%3A%22post_tag%22%3Ba%3A1%3A%7Bi%3A0%3Bs%3A9%3A%22road+bike%22%3B%7D%7D%7D'
          2        DO_FCALL                                      0  $0      
          3        ECHO                                                     $0
          4      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
154.93 ms | 1384 KiB | 13 Q