3v4l.org

run code in 300+ PHP versions simultaneously
<?php $str = 'YmFzZTY0IGVuY29kZWQgc3RyaW5n'; $string = 'This site has not obtained a license from <a href="http://citra.web.id">Citraweb</a>'; $encoded = str_rot13($string); $decoded = str_rot13(str_rot13($string)); echo $encoded ."\n"; echo $decoded; echo base64_decode('Guvf fvgr unf abg bognvarq n yvprafr sebz <n uers="uggc://pvgen.jro.vq">Pvgenjro</n>');
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/3E10M
function name:  (null)
number of ops:  21
compiled vars:  !0 = $str, !1 = $string, !2 = $encoded, !3 = $decoded
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'YmFzZTY0IGVuY29kZWQgc3RyaW5n'
    5     1        ASSIGN                                                   !1, 'This+site+has+not+obtained+a+license+from+%3Ca+href%3D%22http%3A%2F%2Fcitra.web.id%22%3ECitraweb%3C%2Fa%3E'
    6     2        INIT_FCALL                                               'str_rot13'
          3        SEND_VAR                                                 !1
          4        DO_ICALL                                         $6      
          5        ASSIGN                                                   !2, $6
    7     6        INIT_FCALL                                               'str_rot13'
          7        INIT_FCALL                                               'str_rot13'
          8        SEND_VAR                                                 !1
          9        DO_ICALL                                         $8      
         10        SEND_VAR                                                 $8
         11        DO_ICALL                                         $9      
         12        ASSIGN                                                   !3, $9
    8    13        CONCAT                                           ~11     !2, '%0A'
         14        ECHO                                                     ~11
    9    15        ECHO                                                     !3
   11    16        INIT_FCALL                                               'base64_decode'
         17        SEND_VAL                                                 'Guvf+fvgr+unf+abg+bognvarq+n+yvprafr+sebz+%3Cn+uers%3D%22uggc%3A%2F%2Fpvgen.jro.vq%22%3EPvgenjro%3C%2Fn%3E'
         18        DO_ICALL                                         $12     
         19        ECHO                                                     $12
         20      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
172.1 ms | 1395 KiB | 17 Q