3v4l.org

run code in 300+ PHP versions simultaneously
<?php error_reporting(1); require 'functions.php'; ?> <!-- Camwhores.tv video downloader Also works with private vids __ __ _ _ _____ | \/ | | | | | | __ \ | \ / | __ _ __| | ___ | |__ _ _ | | | | __ _ _ _ _ __ ___ | |\/| |/ _` |/ _` |/ _ \ | '_ \| | | | | | | |/ _` | | | | '_ ` _ \ | | | | (_| | (_| | __/ | |_) | |_| | | |__| | (_| | |_| | | | | | | |_| |_|\__,_|\__,_|\___| |_.__/ \__, | |_____/ \__,_|\__, |_| |_| |_| __/ | __/ | |___/ |___/ --> <!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="stylesheet" type="text/css" href="camwhoresddl.css"> <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" integrity="sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va+PmSTsz/K68vbdEjh4u" crossorigin="anonymous"> </head> <body> <div class="container"> <h1 id="mainTitle"> Camwhores.tv private video bypass </h1> <form method="post" action="#" class="form-horizontal"> <div class="form-group"> <label class="control-label" for="videoURL">Private video link</label> <p class="example">Example: http://www.camwhores.tv/videos/206198/j-ckplusjill-anal/</p> <input type="text" name="videoURL" class="form-control" placeholder="Insert video link here" required /><br /> <label class="control-label" for="random">Random public video ddl link</label> <p class="example">Example: http://user5.camwhores.tv/remote_control.php?time=1485616108&cv=1e82c13243fcf2bd0bf13c1263ddad77&lr=312500&cv2=9a5c5664d6ad67446840807c17c95ead&file=%2F177000%2F177444%2F177444.mp4&cv3=3a4110051cef9a72797a1ca99a1dce56</p> <input type="text" name="random" class="form-control" placeholder="Insert random public video link here" required /><br /> <input type="submit" name="sumbitVideoURL" value="Sumbit" class="btn btn-default" style="color:black;"/> </div> </form> <?php //check if form was submitted if(isset($_POST['sumbitVideoURL'])){ $input = $_POST['videoURL']; $random = urldecode($_POST['random']); $videoID = getVideoID($input); $folderID = getFolderID($input,$videoID); /* cv, cv2 and cv3 are 3 security tokens that are generated and use to create the link to the video source Theses hashes will most likely last for about 10min cv3 seems useless since i can get embed video without using it */ $time = get_string_between($random,'time=','&'); // Returned by php time() function $user = get_string_between($random,'//','.'); /* In somes cases, ddl link will start with "videoX" instead of "userX", which causes the fetch to fail. Replacing it will send the video to the right place */ if(strpos($user, 'video') !== false){ $user = str_replace("video", "user", $user); } /* Another case where ddl link starts with "sX" instead of "userX" */ $cv = get_string_between($random,'cv=','&'); $cv2 = get_string_between($random,'cv2=','&'); $cv3 = get_string_between($random . '/','cv3=','/'); $lr = '312500'; // not sure about this, it seems not to change over time // The download link generated $link = 'http://' . $user . '.camwhores.tv/remote_control.php?time='. $time . '&cv=' . $cv . '&lr='. $lr .'&cv2=' . $cv2 . '&file=/'. $folderID .'/' . $videoID .'/' . $videoID . '.mp4&cv3=' . $cv3; $fetch = false; // Showing download link if we have correct parameters if(checkFileValidity(get_string_between('$$' . $link,'$$','&cv3'))){ $fetch = true; }else{ if(strpos($user, 'user') !== false){ $user = "s6"; } else { $user = "user9"; } $link = 'http://' . $user . '.camwhores.tv/remote_control.php?time='. $time . '&cv=' . $cv . '&lr='. $lr .'&cv2=' . $cv2 . '&file=/'. $folderID .'/' . $videoID .'/' . $videoID . '.mp4&cv3=' . $cv3; $fetch = checkFileValidity(get_string_between('$$' . $link,'$$','&cv3')); } if($fetch){ echo '<video id="player" width="640" height="480" controls> <source src="'. get_string_between('$$' . $link,'$$','&cv3') .'" type="video/mp4"> Your browser does not support the video tag. </video>'; echo '<br /><a href="'. $link . '" download="' . $videoID . '" class="btn btn-success">Download video</a>'; } else echo '<div class="alert alert-danger">Error while fetching video. Make sure you post a correct URL, or try to change ddl link</div>'; } ?> <h2> How to get random public video ddl link </h2> <p> Example is made by using Video DownloadHelper, but you can use any video downloader plugin.<br /> <a href="https://chrome.google.com/webstore/detail/video-downloadhelper/lmjnegcaeklhafolokijcfjliaokphfk" target="_blank">Download Video DownloadHelper for chrome</a> <br /> <a href="https://addons.mozilla.org/fr/firefox/addon/video-downloadhelper/" target="_blank">Download Video DownloadHelper for firefox</a> <br /> <br /> Then choose any public video (apart from openload player), play the video and follow these steps: </p> <div class="row"> <div class="col-md-4"> <div class="thumbnail"> <a href="imgs/vdh-first-step.jpg" target="_blank"> <img src="imgs/vdh-first-step.jpg" alt="vdh-first-step" style="width:100%"> <div class="caption"> </div> </a> </div> </div> <div class="col-md-4"> <div class="thumbnail"> <a href="imgs/vdh-second-step.jpg" target="_blank"> <img src="imgs/vdh-second-step.jpg" alt="vdh-second-step" style="width:100%"> <div class="caption"> </div> </a> </div> </div> </div> <!-- End of row --> <h3>Alternative way to get ddl link without using plugin</h3> <p> - Find a random public video, click play - Browse the code until you find the video tag, it should look like this <img src="imgs/alternative.jpg" alt="alternative" style="width:80%"><br /> - Open src URL, it should lead you to the ddl link </p> <pre class="signature"> __ __ _ _ _____ | \/ | | | | | | __ \ | \ / | __ _ __| | ___ | |__ _ _ | | | | __ _ _ _ _ __ ___ | |\/| |/ _` |/ _` |/ _ \ | '_ \| | | | | | | |/ _` | | | | '_ ` _ \ | | | | (_| | (_| | __/ | |_) | |_| | | |__| | (_| | |_| | | | | | | |_| |_|\__,_|\__,_|\___| |_.__/ \__, | |_____/ \__,_|\__, |_| |_| |_| __/ | __/ | |___/ |___/ Nothing is private on the internet </pre> </div> <!-- End of container --> </body> <div class="scripts"> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.1.1/jquery.min.js"></script> <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin="anonymous"></script> </div> </html>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 8, Position 2 = 155
Branch analysis from position: 8
2 jumps found. (Code = 43) Position 1 = 44, Position 2 = 50
Branch analysis from position: 44
2 jumps found. (Code = 43) Position 1 = 99, Position 2 = 101
Branch analysis from position: 99
1 jumps found. (Code = 42) Position 1 = 138
Branch analysis from position: 138
2 jumps found. (Code = 43) Position 1 = 139, Position 2 = 154
Branch analysis from position: 139
1 jumps found. (Code = 42) Position 1 = 155
Branch analysis from position: 155
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 154
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 101
2 jumps found. (Code = 43) Position 1 = 107, Position 2 = 109
Branch analysis from position: 107
1 jumps found. (Code = 42) Position 1 = 110
Branch analysis from position: 110
2 jumps found. (Code = 43) Position 1 = 139, Position 2 = 154
Branch analysis from position: 139
Branch analysis from position: 154
Branch analysis from position: 109
2 jumps found. (Code = 43) Position 1 = 139, Position 2 = 154
Branch analysis from position: 139
Branch analysis from position: 154
Branch analysis from position: 50
Branch analysis from position: 155
filename:       /in/DHqL3
function name:  (null)
number of ops:  157
compiled vars:  !0 = $input, !1 = $random, !2 = $videoID, !3 = $folderID, !4 = $time, !5 = $user, !6 = $cv, !7 = $cv2, !8 = $cv3, !9 = $lr, !10 = $link, !11 = $fetch
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'error_reporting'
          1        SEND_VAL                                                 1
          2        DO_ICALL                                                 
    3     3        INCLUDE_OR_EVAL                                          'functions.php', REQUIRE
    5     4        ECHO                                                     '%0A%09%3C%21--%0A%0ACamwhores.tv+video+downloader%0AAlso+works+with+private+vids%0A%0A++__++__+++++++++++_++++++++_+++++++++++++_____++++++++++++++++++++++++%0A+%7C++%5C%2F++%7C+++++++++%7C+%7C++++++%7C+%7C+++++++++++%7C++__+%5C+++++++++++++++++++++++%0A+%7C+%5C++%2F+%7C+__+_++__%7C+%7C+___++%7C+%7C__++_+++_++%7C+%7C++%7C+%7C+__+_+_+++_+_+__+___++%0A+%7C+%7C%5C%2F%7C+%7C%2F+_%60+%7C%2F+_%60+%7C%2F+_+%5C+%7C+%27_+%5C%7C+%7C+%7C+%7C+%7C+%7C++%7C+%7C%2F+_%60+%7C+%7C+%7C+%7C+%27_+%60+_+%5C+%0A+%7C+%7C++%7C+%7C+%28_%7C+%7C+%28_%7C+%7C++__%2F+%7C+%7C_%29+%7C+%7C_%7C+%7C+%7C+%7C__%7C+%7C+%28_%7C+%7C+%7C_%7C+%7C+%7C+%7C+%7C+%7C+%7C%0A+%7C_%7C++%7C_%7C%5C__%2C_%7C%5C__%2C_%7C%5C___%7C+%7C_.__%2F+%5C__%2C+%7C+%7C_____%2F+%5C__%2C_%7C%5C__%2C+%7C_%7C+%7C_%7C+%7C_%7C%0A+++++++++++++++++++++++++++++++++++__%2F+%7C++++++++++++++++__%2F+%7C++++++++++%0A++++++++++++++++++++++++++++++++++%7C___%2F++++++++++++++++%7C___%2F+%0A--%3E%0A%3C%21DOCTYPE+html%3E%0A%3Chtml+lang%3D%22en%22%3E%0A%09%3Chead%3E%0A%0A%3Cmeta+charset%3D%22utf-8%22%3E%0A%3Cmeta+name%3D%22viewport%22+content%3D%22width%3Ddevice-width%2C+initial-scale%3D1%22%3E%0A%3Clink+rel%3D%22stylesheet%22+type%3D%22text%2Fcss%22+href%3D%22camwhoresddl.css%22%3E%09%0A%3Clink+rel%3D%22stylesheet%22+href%3D%22https%3A%2F%2Fmaxcdn.bootstrapcdn.com%2Fbootstrap%2F3.3.7%2Fcss%2Fbootstrap.min.css%22+integrity%3D%22sha384-BVYiiSIFeK1dGmJRAkycuHAHRg32OmUcww7on3RYdg4Va%2BPmSTsz%2FK68vbdEjh4u%22+crossorigin%3D%22anonymous%22%3E%0A%3C%2Fhead%3E%0A%0A%3Cbody%3E%0A%0A%3Cdiv+class%3D%22container%22%3E%0A%0A%3Ch1+id%3D%22mainTitle%22%3E%0ACamwhores.tv+private+video+bypass%0A%3C%2Fh1%3E%0A%0A%3Cform+method%3D%22post%22+action%3D%22%23%22+class%3D%22form-horizontal%22%3E%0A+%3Cdiv+class%3D%22form-group%22%3E%0A%3Clabel+class%3D%22control-label%22+for%3D%22videoURL%22%3EPrivate+video+link%3C%2Flabel%3E%0A%0A%3Cp+class%3D%22example%22%3EExample%3A+http%3A%2F%2Fwww.camwhores.tv%2Fvideos%2F206198%2Fj-ckplusjill-anal%2F%3C%2Fp%3E%0A%3Cinput+type%3D%22text%22+name%3D%22videoURL%22+class%3D%22form-control%22+placeholder%3D%22Insert+video+link+here%22+required+%2F%3E%3Cbr+%2F%3E%0A%0A%3Clabel+class%3D%22control-label%22+for%3D%22random%22%3ERandom+public+video+ddl+link%3C%2Flabel%3E%0A%3Cp+class%3D%22example%22%3EExample%3A+http%3A%2F%2Fuser5.camwhores.tv%2Fremote_control.php%3Ftime%3D1485616108%26cv%3D1e82c13243fcf2bd0bf13c1263ddad77%26lr%3D312500%26cv2%3D9a5c5664d6ad67446840807c17c95ead%26file%3D%252F177000%252F177444%252F177444.mp4%26cv3%3D3a4110051cef9a72797a1ca99a1dce56%3C%2Fp%3E%0A%3Cinput+type%3D%22text%22+name%3D%22random%22+class%3D%22form-control%22+placeholder%3D%22Insert+random+public+video+link+here%22+required+%2F%3E%3Cbr+%2F%3E%0A%0A%0A%3Cinput+type%3D%22submit%22+name%3D%22sumbitVideoURL%22+value%3D%22Sumbit%22+class%3D%22btn+btn-default%22+style%3D%22color%3Ablack%3B%22%2F%3E%0A%3C%2Fdiv%3E%0A%3C%2Fform%3E%0A%0A%0A'
   58     5        FETCH_IS                                         ~14     '_POST'
          6        ISSET_ISEMPTY_DIM_OBJ                         0          ~14, 'sumbitVideoURL'
          7      > JMPZ                                                     ~15, ->155
   60     8    >   FETCH_R                      global              ~16     '_POST'
          9        FETCH_DIM_R                                      ~17     ~16, 'videoURL'
         10        ASSIGN                                                   !0, ~17
   61    11        INIT_FCALL                                               'urldecode'
         12        FETCH_R                      global              ~19     '_POST'
         13        FETCH_DIM_R                                      ~20     ~19, 'random'
         14        SEND_VAL                                                 ~20
         15        DO_ICALL                                         $21     
         16        ASSIGN                                                   !1, $21
   62    17        INIT_FCALL_BY_NAME                                       'getVideoID'
         18        SEND_VAR_EX                                              !0
         19        DO_FCALL                                      0  $23     
         20        ASSIGN                                                   !2, $23
   63    21        INIT_FCALL_BY_NAME                                       'getFolderID'
         22        SEND_VAR_EX                                              !0
         23        SEND_VAR_EX                                              !2
         24        DO_FCALL                                      0  $25     
         25        ASSIGN                                                   !3, $25
   70    26        INIT_FCALL_BY_NAME                                       'get_string_between'
         27        SEND_VAR_EX                                              !1
         28        SEND_VAL_EX                                              'time%3D'
         29        SEND_VAL_EX                                              '%26'
         30        DO_FCALL                                      0  $27     
         31        ASSIGN                                                   !4, $27
   71    32        INIT_FCALL_BY_NAME                                       'get_string_between'
         33        SEND_VAR_EX                                              !1
         34        SEND_VAL_EX                                              '%2F%2F'
         35        SEND_VAL_EX                                              '.'
         36        DO_FCALL                                      0  $29     
         37        ASSIGN                                                   !5, $29
   78    38        INIT_FCALL                                               'strpos'
         39        SEND_VAR                                                 !5
         40        SEND_VAL                                                 'video'
         41        DO_ICALL                                         $31     
         42        TYPE_CHECK                                  1018          $31
         43      > JMPZ                                                     ~32, ->50
   79    44    >   INIT_FCALL                                               'str_replace'
         45        SEND_VAL                                                 'video'
         46        SEND_VAL                                                 'user'
         47        SEND_VAR                                                 !5
         48        DO_ICALL                                         $33     
         49        ASSIGN                                                   !5, $33
   87    50    >   INIT_FCALL_BY_NAME                                       'get_string_between'
         51        SEND_VAR_EX                                              !1
         52        SEND_VAL_EX                                              'cv%3D'
         53        SEND_VAL_EX                                              '%26'
         54        DO_FCALL                                      0  $35     
         55        ASSIGN                                                   !6, $35
   88    56        INIT_FCALL_BY_NAME                                       'get_string_between'
         57        SEND_VAR_EX                                              !1
         58        SEND_VAL_EX                                              'cv2%3D'
         59        SEND_VAL_EX                                              '%26'
         60        DO_FCALL                                      0  $37     
         61        ASSIGN                                                   !7, $37
   89    62        INIT_FCALL_BY_NAME                                       'get_string_between'
         63        CONCAT                                           ~39     !1, '%2F'
         64        SEND_VAL_EX                                              ~39
         65        SEND_VAL_EX                                              'cv3%3D'
         66        SEND_VAL_EX                                              '%2F'
         67        DO_FCALL                                      0  $40     
         68        ASSIGN                                                   !8, $40
   90    69        ASSIGN                                                   !9, '312500'
   93    70        CONCAT                                           ~43     'http%3A%2F%2F', !5
         71        CONCAT                                           ~44     ~43, '.camwhores.tv%2Fremote_control.php%3Ftime%3D'
         72        CONCAT                                           ~45     ~44, !4
         73        CONCAT                                           ~46     ~45, '%26cv%3D'
         74        CONCAT                                           ~47     ~46, !6
         75        CONCAT                                           ~48     ~47, '%26lr%3D'
         76        CONCAT                                           ~49     ~48, !9
         77        CONCAT                                           ~50     ~49, '%26cv2%3D'
         78        CONCAT                                           ~51     ~50, !7
         79        CONCAT                                           ~52     ~51, '%26file%3D%2F'
         80        CONCAT                                           ~53     ~52, !3
         81        CONCAT                                           ~54     ~53, '%2F'
         82        CONCAT                                           ~55     ~54, !2
         83        CONCAT                                           ~56     ~55, '%2F'
         84        CONCAT                                           ~57     ~56, !2
         85        CONCAT                                           ~58     ~57, '.mp4%26cv3%3D'
         86        CONCAT                                           ~59     ~58, !8
         87        ASSIGN                                                   !10, ~59
   94    88        ASSIGN                                                   !11, <false>
   96    89        INIT_FCALL_BY_NAME                                       'checkFileValidity'
         90        INIT_FCALL_BY_NAME                                       'get_string_between'
         91        CONCAT                                           ~62     '%24%24', !10
         92        SEND_VAL_EX                                              ~62
         93        SEND_VAL_EX                                              '%24%24'
         94        SEND_VAL_EX                                              '%26cv3'
         95        DO_FCALL                                      0  $63     
         96        SEND_VAR_NO_REF_EX                                       $63
         97        DO_FCALL                                      0  $64     
         98      > JMPZ                                                     $64, ->101
   97    99    >   ASSIGN                                                   !11, <true>
        100      > JMP                                                      ->138
  100   101    >   INIT_FCALL                                               'strpos'
        102        SEND_VAR                                                 !5
        103        SEND_VAL                                                 'user'
        104        DO_ICALL                                         $66     
        105        TYPE_CHECK                                  1018          $66
        106      > JMPZ                                                     ~67, ->109
  101   107    >   ASSIGN                                                   !5, 's6'
        108      > JMP                                                      ->110
  105   109    >   ASSIGN                                                   !5, 'user9'
  108   110    >   CONCAT                                           ~70     'http%3A%2F%2F', !5
        111        CONCAT                                           ~71     ~70, '.camwhores.tv%2Fremote_control.php%3Ftime%3D'
        112        CONCAT                                           ~72     ~71, !4
        113        CONCAT                                           ~73     ~72, '%26cv%3D'
        114        CONCAT                                           ~74     ~73, !6
        115        CONCAT                                           ~75     ~74, '%26lr%3D'
        116        CONCAT                                           ~76     ~75, !9
        117        CONCAT                                           ~77     ~76, '%26cv2%3D'
        118        CONCAT                                           ~78     ~77, !7
        119        CONCAT                                           ~79     ~78, '%26file%3D%2F'
        120        CONCAT                                           ~80     ~79, !3
        121        CONCAT                                           ~81     ~80, '%2F'
        122        CONCAT                                           ~82     ~81, !2
        123        CONCAT                                           ~83     ~82, '%2F'
        124        CONCAT                                           ~84     ~83, !2
        125        CONCAT                                           ~85     ~84, '.mp4%26cv3%3D'
        126        CONCAT                                           ~86     ~85, !8
        127        ASSIGN                                                   !10, ~86
  109   128        INIT_FCALL_BY_NAME                                       'checkFileValidity'
        129        INIT_FCALL_BY_NAME                                       'get_string_between'
        130        CONCAT                                           ~88     '%24%24', !10
        131        SEND_VAL_EX                                              ~88
        132        SEND_VAL_EX                                              '%24%24'
        133        SEND_VAL_EX                                              '%26cv3'
        134        DO_FCALL                                      0  $89     
        135        SEND_VAR_NO_REF_EX                                       $89
        136        DO_FCALL                                      0  $90     
        137        ASSIGN                                                   !11, $90
  113   138    > > JMPZ                                                     !11, ->154
  116   139    >   INIT_FCALL_BY_NAME                                       'get_string_between'
        140        CONCAT                                           ~92     '%24%24', !10
        141        SEND_VAL_EX                                              ~92
        142        SEND_VAL_EX                                              '%24%24'
        143        SEND_VAL_EX                                              '%26cv3'
        144        DO_FCALL                                      0  $93     
        145        CONCAT                                           ~94     '%3Cvideo+id%3D%22player%22+width%3D%22640%22+height%3D%22480%22+controls%3E%0A++++%3Csource+src%3D%22', $93
        146        CONCAT                                           ~95     ~94, '%22+type%3D%22video%2Fmp4%22%3E%0A++++Your+browser+does+not+support+the+video+tag.%0A%3C%2Fvideo%3E'
        147        ECHO                                                     ~95
  119   148        CONCAT                                           ~96     '%3Cbr+%2F%3E%3Ca+href%3D%22', !10
        149        CONCAT                                           ~97     ~96, '%22+download%3D%22'
        150        CONCAT                                           ~98     ~97, !2
        151        CONCAT                                           ~99     ~98, '%22+class%3D%22btn+btn-success%22%3EDownload+video%3C%2Fa%3E'
        152        ECHO                                                     ~99
        153      > JMP                                                      ->155
  122   154    >   ECHO                                                     '%3Cdiv+class%3D%22alert+alert-danger%22%3EError+while+fetching+video.+Make+sure+you+post+a+correct+URL%2C+or+try+to+change+ddl+link%3C%2Fdiv%3E'
  130   155    >   ECHO                                                     '%0A%3Ch2%3E+How+to+get+random+public+video+ddl+link+%3C%2Fh2%3E%0A%0A%3Cp%3E+%0A%0AExample+is+made+by+using+Video+DownloadHelper%2C+but+you+can+use+any+video+downloader+plugin.%3Cbr+%2F%3E%0A%3Ca+href%3D%22https%3A%2F%2Fchrome.google.com%2Fwebstore%2Fdetail%2Fvideo-downloadhelper%2Flmjnegcaeklhafolokijcfjliaokphfk%22+target%3D%22_blank%22%3EDownload+Video+DownloadHelper+for+chrome%3C%2Fa%3E%0A%3Cbr+%2F%3E%0A%3Ca+href%3D%22https%3A%2F%2Faddons.mozilla.org%2Ffr%2Ffirefox%2Faddon%2Fvideo-downloadhelper%2F%22+target%3D%22_blank%22%3EDownload+Video+DownloadHelper+for+firefox%3C%2Fa%3E%0A%3Cbr+%2F%3E%0A%3Cbr+%2F%3E%0A%0AThen+choose+any+public+video+%28apart+from+openload+player%29%2C+play+the+video+and+follow+these+steps%3A+%0A%3C%2Fp%3E%0A%0A%3Cdiv+class%3D%22row%22%3E%0A++%0A++%3Cdiv+class%3D%22col-md-4%22%3E%0A++++%3Cdiv+class%3D%22thumbnail%22%3E%0A++++%09%3Ca+href%3D%22imgs%2Fvdh-first-step.jpg%22+target%3D%22_blank%22%3E%0A++++++++%3Cimg+src%3D%22imgs%2Fvdh-first-step.jpg%22+alt%3D%22vdh-first-step%22+style%3D%22width%3A100%25%22%3E%0A++++++++%3Cdiv+class%3D%22caption%22%3E%0A++++++++%3C%2Fdiv%3E%0A%3C%2Fa%3E%0A++++%3C%2Fdiv%3E%0A++%3C%2Fdiv%3E%0A%0A%0A++%3Cdiv+class%3D%22col-md-4%22%3E%0A++++%3Cdiv+class%3D%22thumbnail%22%3E%0A++++%09%3Ca+href%3D%22imgs%2Fvdh-second-step.jpg%22++target%3D%22_blank%22%3E%0A++++++++%3Cimg+src%3D%22imgs%2Fvdh-second-step.jpg%22+alt%3D%22vdh-second-step%22+style%3D%22width%3A100%25%22%3E%0A++++++++%3Cdiv+class%3D%22caption%22%3E%0A++++++++%3C%2Fdiv%3E%0A%3C%2Fa%3E%0A++++%3C%2Fdiv%3E%0A++%3C%2Fdiv%3E%0A%0A%3C%2Fdiv%3E+%3C%21--+End+of+row+--%3E%0A%0A%3Ch3%3EAlternative+way+to+get+ddl+link+without+using+plugin%3C%2Fh3%3E%0A%3Cp%3E%0A-+Find+a+random+public+video%2C+click+play%0A-+Browse+the+code+until+you+find+the+video+tag%2C+it+should+look+like+this%0A%3Cimg+src%3D%22imgs%2Falternative.jpg%22+alt%3D%22alternative%22+style%3D%22width%3A80%25%22%3E%3Cbr+%2F%3E%0A-+Open+src+URL%2C+it+should+lead+you+to+the+ddl+link%0A%3C%2Fp%3E%0A%0A%3Cpre+class%3D%22signature%22%3E%0A%0A++__++__+++++++++++_++++++++_+++++++++++++_____++++++++++++++++++++++++%0A+%7C++%5C%2F++%7C+++++++++%7C+%7C++++++%7C+%7C+++++++++++%7C++__+%5C+++++++++++++++++++++++%0A+%7C+%5C++%2F+%7C+__+_++__%7C+%7C+___++%7C+%7C__++_+++_++%7C+%7C++%7C+%7C+__+_+_+++_+_+__+___++%0A+%7C+%7C%5C%2F%7C+%7C%2F+_%60+%7C%2F+_%60+%7C%2F+_+%5C+%7C+%27_+%5C%7C+%7C+%7C+%7C+%7C+%7C++%7C+%7C%2F+_%60+%7C+%7C+%7C+%7C+%27_+%60+_+%5C+%0A+%7C+%7C++%7C+%7C+%28_%7C+%7C+%28_%7C+%7C++__%2F+%7C+%7C_%29+%7C+%7C_%7C+%7C+%7C+%7C__%7C+%7C+%28_%7C+%7C+%7C_%7C+%7C+%7C+%7C+%7C+%7C+%7C%0A+%7C_%7C++%7C_%7C%5C__%2C_%7C%5C__%2C_%7C%5C___%7C+%7C_.__%2F+%5C__%2C+%7C+%7C_____%2F+%5C__%2C_%7C%5C__%2C+%7C_%7C+%7C_%7C+%7C_%7C%0A+++++++++++++++++++++++++++++++++++__%2F+%7C++++++++++++++++__%2F+%7C++++++++++%0A++++++++++++++++++++++++++++++++++%7C___%2F++++++++++++++++%7C___%2F+%0A%0ANothing+is+private+on+the+internet%0A%3C%2Fpre%3E%0A%0A%0A%3C%2Fdiv%3E+%3C%21--+End+of+container+--%3E%0A%0A%0A%3C%2Fbody%3E%0A%0A%3Cdiv+class%3D%22scripts%22%3E%0A%3Cscript+src%3D%22https%3A%2F%2Fajax.googleapis.com%2Fajax%2Flibs%2Fjquery%2F3.1.1%2Fjquery.min.js%22%3E%3C%2Fscript%3E%0A%3Cscript+src%3D%22https%3A%2F%2Fmaxcdn.bootstrapcdn.com%2Fbootstrap%2F3.3.7%2Fjs%2Fbootstrap.min.js%22+integrity%3D%22sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa%22+crossorigin%3D%22anonymous%22%3E%3C%2Fscript%3E%0A%3C%2Fdiv%3E%0A%3C%2Fhtml%3E'
  202   156      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
168.53 ms | 1416 KiB | 21 Q