3v4l.org

run code in 300+ PHP versions simultaneously
<?php $password = "aaacsJYLE"; // goodluck bruteforcing this! if ($password == md5($password . $nacl)){ print $flag; }
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 7, Position 2 = 8
Branch analysis from position: 7
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 8
filename:       /in/Cniq4
function name:  (null)
number of ops:  9
compiled vars:  !0 = $password, !1 = $nacl, !2 = $flag
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                   !0, 'aaacsJYLE'
    4     1        INIT_FCALL                                               'md5'
          2        CONCAT                                           ~4      !0, !1
          3        SEND_VAL                                                 ~4
          4        DO_ICALL                                         $5      
          5        IS_EQUAL                                                 !0, $5
          6      > JMPZ                                                     ~6, ->8
    5     7    >   ECHO                                                     !2
    6     8    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
168.9 ms | 1394 KiB | 15 Q