3v4l.org

run code in 300+ PHP versions simultaneously
<?php $browser = new COM("InternetExplorer.Application"); $handle = $browser->HWND; $browser->Visible = true; $browser->Width = 800; $browser->Height = 3000; $browser->Resizable = false; $browser->Navigate("http://surrenderat20.net"); while ($browser->Busy) { com_message_pump(4000); } ob_start(); $im = imagegrabwindow($handle, 0); imagejpeg($im, NULL, 100); $rawBytes = ob_get_clean(); echo "<div id='screenshot'><img src='data:images/jpeg;base64,".base64_encode($rawBytes)."'/></div>"; $browser->Quit(); imagedestroy($im);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 42) Position 1 = 21
Branch analysis from position: 21
2 jumps found. (Code = 44) Position 1 = 23, Position 2 = 18
Branch analysis from position: 23
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 18
2 jumps found. (Code = 44) Position 1 = 23, Position 2 = 18
Branch analysis from position: 23
Branch analysis from position: 18
filename:       /in/EIqv0
function name:  (null)
number of ops:  50
compiled vars:  !0 = $browser, !1 = $handle, !2 = $im, !3 = $rawBytes
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   NEW                                              $4      'COM'
          1        SEND_VAL_EX                                              'InternetExplorer.Application'
          2        DO_FCALL                                      0          
          3        ASSIGN                                                   !0, $4
    4     4        FETCH_OBJ_R                                      ~7      !0, 'HWND'
          5        ASSIGN                                                   !1, ~7
    5     6        ASSIGN_OBJ                                               !0, 'Visible'
          7        OP_DATA                                                  <true>
    6     8        ASSIGN_OBJ                                               !0, 'Width'
          9        OP_DATA                                                  800
    7    10        ASSIGN_OBJ                                               !0, 'Height'
         11        OP_DATA                                                  3000
    8    12        ASSIGN_OBJ                                               !0, 'Resizable'
         13        OP_DATA                                                  <false>
    9    14        INIT_METHOD_CALL                                         !0, 'Navigate'
         15        SEND_VAL_EX                                              'http%3A%2F%2Fsurrenderat20.net'
         16        DO_FCALL                                      0          
   11    17      > JMP                                                      ->21
   12    18    >   INIT_FCALL_BY_NAME                                       'com_message_pump'
         19        SEND_VAL_EX                                              4000
         20        DO_FCALL                                      0          
   11    21    >   FETCH_OBJ_R                                      ~15     !0, 'Busy'
         22      > JMPNZ                                                    ~15, ->18
   15    23    >   INIT_FCALL                                               'ob_start'
         24        DO_ICALL                                                 
   17    25        INIT_FCALL_BY_NAME                                       'imagegrabwindow'
         26        SEND_VAR_EX                                              !1
         27        SEND_VAL_EX                                              0
         28        DO_FCALL                                      0  $17     
         29        ASSIGN                                                   !2, $17
   18    30        INIT_FCALL_BY_NAME                                       'imagejpeg'
         31        SEND_VAR_EX                                              !2
         32        SEND_VAL_EX                                              null
         33        SEND_VAL_EX                                              100
         34        DO_FCALL                                      0          
   19    35        INIT_FCALL                                               'ob_get_clean'
         36        DO_ICALL                                         $20     
         37        ASSIGN                                                   !3, $20
   21    38        INIT_FCALL                                               'base64_encode'
         39        SEND_VAR                                                 !3
         40        DO_ICALL                                         $22     
         41        CONCAT                                           ~23     '%3Cdiv+id%3D%27screenshot%27%3E%3Cimg+src%3D%27data%3Aimages%2Fjpeg%3Bbase64%2C', $22
         42        CONCAT                                           ~24     ~23, '%27%2F%3E%3C%2Fdiv%3E'
         43        ECHO                                                     ~24
   23    44        INIT_METHOD_CALL                                         !0, 'Quit'
         45        DO_FCALL                                      0          
   24    46        INIT_FCALL_BY_NAME                                       'imagedestroy'
         47        SEND_VAR_EX                                              !2
         48        DO_FCALL                                      0          
         49      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
156.88 ms | 1400 KiB | 19 Q