3v4l.org

run code in 300+ PHP versions simultaneously
<?php $cookie = "O%3A11%3A%22SERIAL_User%22%3A3%3A%7Bs%3A8%3A%22username%22%3Bs%3A4%3A%22test%22%3Bs%3A8%3A%22password%22%3Bs%3A8%3A%22testtest%22%3Bs%3A9%3A%22userlevel%22%3Bi%3A0%3B%7D"; $pt = unserialize($cookie); echo $pt ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/3XUY1
function name:  (null)
number of ops:  7
compiled vars:  !0 = $cookie, !1 = $pt
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 'O%253A11%253A%2522SERIAL_User%2522%253A3%253A%257Bs%253A8%253A%2522username%2522%253Bs%253A4%253A%2522test%2522%253Bs%253A8%253A%2522password%2522%253Bs%253A8%253A%2522testtest%2522%253Bs%253A9%253A%2522userlevel%2522%253Bi%253A0%253B%257D'
    5     1        INIT_FCALL                                               'unserialize'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $3      
          4        ASSIGN                                                   !1, $3
    7     5        ECHO                                                     !1
    9     6      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
176.85 ms | 1393 KiB | 15 Q