3v4l.org

run code in 300+ PHP versions simultaneously
<?php $x = str_replace('0x', '', ' 0x54, 0x68, 0x65, 0x20, 0x64, 0x68, 0x6f, 0x6c, 0x65, 0x20, 0x28, 0x70, 0x72, 0x6f, 0x6e, 0x6f, 0x75, 0x6e, 0x63, 0x65, 0x64, 0x20, 0x22, 0x64, 0x6f, 0x6c, 0x65, 0x22, 0x29, 0x20, 0x69, 0x73, 0x20, 0x61, 0x6c, 0x73, 0x6f, 0x20, 0x6b, 0x6e, 0x6f, 0x77, 0x6e, 0x20, 0x61, 0x73, 0x20, 0x74, 0x68, 0x65, 0x20, 0x41, 0x73, 0x69, 0x61, 0x74, 0x69, 0x63, 0x20, 0x77, 0x69, 0x6c, 0x64, 0x20, 0x64, 0x6f, 0x67, 0x2c, 0x20, 0x72, 0x65, 0x64, 0x20, 0x64, 0x6f, 0x67, 0x2c, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x77, 0x68, 0x69, 0x73, 0x74, 0x6c, 0x69, 0x6e, 0x67, 0x20, 0x64, 0x6f, 0x67, 0x2e, 0x20, 0x49, 0x74, 0x20, 0x69, 0x73, 0x20, 0x61, 0x62, 0x6f, 0x75, 0x74, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x69, 0x7a, 0x65, 0x20, 0x6f, 0x66, 0x20, 0x61, 0x20, 0x47, 0x65, 0x72, 0x6d, 0x61, 0x6e, 0x20, 0x73, 0x68, 0x65, 0x70, 0x68, 0x65, 0x72, 0x64, 0x20, 0x62, 0x75, 0x74, 0x20, 0x6c, 0x6f, 0x6f, 0x6b, 0x73, 0x20, 0x6d, 0x6f, 0x72, 0x65, 0x20, 0x6c, 0x69, 0x6b, 0x65, 0x20, 0x61, 0x20, 0x6c, 0x6f, 0x6e, 0x67, 0x2d, 0x6c, 0x65, 0x67, 0x67, 0x65, 0x64, 0x20, 0x66, 0x6f, 0x78, 0x2e, 0x20, 0x54, 0x68, 0x69, 0x73, 0x20, 0x68, 0x69, 0x67, 0x68, 0x6c, 0x79, 0x20, 0x65, 0x6c, 0x75, 0x73, 0x69, 0x76, 0x65, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x73, 0x6b, 0x69, 0x6c, 0x6c, 0x65, 0x64, 0x20, 0x6a, 0x75, 0x6d, 0x70, 0x65, 0x72, 0x20, 0x69, 0x73, 0x20, 0x63, 0x6c, 0x61, 0x73, 0x73, 0x69, 0x66, 0x69, 0x65, 0x64, 0x20, 0x77, 0x69, 0x74, 0x68, 0x20, 0x77, 0x6f, 0x6c, 0x76, 0x65, 0x73, 0x2c, 0x20, 0x63, 0x6f, 0x79, 0x6f, 0x74, 0x65, 0x73, 0x2c, 0x20, 0x6a, 0x61, 0x63, 0x6b, 0x61, 0x6c, 0x73, 0x2c, 0x20, 0x61, 0x6e, 0x64, 0x20, 0x66, 0x6f, 0x78, 0x65, 0x73, 0x20, 0x69, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x74, 0x61, 0x78, 0x6f, 0x6e, 0x6f, 0x6d, 0x69, 0x63, 0x20, 0x66, 0x61, 0x6d, 0x69, 0x6c, 0x79, 0x20, 0x43, 0x61, 0x6e, 0x69, 0x64, 0x61, 0x65, 0x2e,'); $x = preg_replace('/[^0-9a-f]/', '', $x); echo hex2bin($x);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/Rodgg
function name:  (null)
number of ops:  17
compiled vars:  !0 = $x
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   INIT_FCALL                                               'str_replace'
          1        SEND_VAL                                                 '0x'
          2        SEND_VAL                                                 ''
          3        SEND_VAL                                                 '%0A%09%090x54%2C+0x68%2C+0x65%2C+0x20%2C+0x64%2C+0x68%2C+0x6f%2C+0x6c%2C%0A%09%090x65%2C+0x20%2C+0x28%2C+0x70%2C+0x72%2C+0x6f%2C+0x6e%2C+0x6f%2C%0A%09%090x75%2C+0x6e%2C+0x63%2C+0x65%2C+0x64%2C+0x20%2C+0x22%2C+0x64%2C%0A%09%090x6f%2C+0x6c%2C+0x65%2C+0x22%2C+0x29%2C+0x20%2C+0x69%2C+0x73%2C%0A%09%090x20%2C+0x61%2C+0x6c%2C+0x73%2C+0x6f%2C+0x20%2C+0x6b%2C+0x6e%2C%0A%09%090x6f%2C+0x77%2C+0x6e%2C+0x20%2C+0x61%2C+0x73%2C+0x20%2C+0x74%2C%0A%09%090x68%2C+0x65%2C+0x20%2C+0x41%2C+0x73%2C+0x69%2C+0x61%2C+0x74%2C%0A%09%090x69%2C+0x63%2C+0x20%2C+0x77%2C+0x69%2C+0x6c%2C+0x64%2C+0x20%2C%0A%09%090x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x72%2C+0x65%2C+0x64%2C%0A%09%090x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x77%2C+0x68%2C+0x69%2C+0x73%2C+0x74%2C+0x6c%2C%0A%09%090x69%2C+0x6e%2C+0x67%2C+0x20%2C+0x64%2C+0x6f%2C+0x67%2C+0x2e%2C%0A%09%090x20%2C+0x49%2C+0x74%2C+0x20%2C+0x69%2C+0x73%2C+0x20%2C+0x61%2C%0A%09%090x62%2C+0x6f%2C+0x75%2C+0x74%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C%0A%09%090x20%2C+0x73%2C+0x69%2C+0x7a%2C+0x65%2C+0x20%2C+0x6f%2C+0x66%2C%0A%09%090x20%2C+0x61%2C+0x20%2C+0x47%2C+0x65%2C+0x72%2C+0x6d%2C+0x61%2C%0A%09%090x6e%2C+0x20%2C+0x73%2C+0x68%2C+0x65%2C+0x70%2C+0x68%2C+0x65%2C%0A%09%090x72%2C+0x64%2C+0x20%2C+0x62%2C+0x75%2C+0x74%2C+0x20%2C+0x6c%2C%0A%09%090x6f%2C+0x6f%2C+0x6b%2C+0x73%2C+0x20%2C+0x6d%2C+0x6f%2C+0x72%2C%0A%09%090x65%2C+0x20%2C+0x6c%2C+0x69%2C+0x6b%2C+0x65%2C+0x20%2C+0x61%2C%0A%09%090x20%2C+0x6c%2C+0x6f%2C+0x6e%2C+0x67%2C+0x2d%2C+0x6c%2C+0x65%2C%0A%09%090x67%2C+0x67%2C+0x65%2C+0x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C%0A%09%090x2e%2C+0x20%2C+0x54%2C+0x68%2C+0x69%2C+0x73%2C+0x20%2C+0x68%2C%0A%09%090x69%2C+0x67%2C+0x68%2C+0x6c%2C+0x79%2C+0x20%2C+0x65%2C+0x6c%2C%0A%09%090x75%2C+0x73%2C+0x69%2C+0x76%2C+0x65%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x73%2C+0x6b%2C+0x69%2C+0x6c%2C+0x6c%2C+0x65%2C%0A%09%090x64%2C+0x20%2C+0x6a%2C+0x75%2C+0x6d%2C+0x70%2C+0x65%2C+0x72%2C%0A%09%090x20%2C+0x69%2C+0x73%2C+0x20%2C+0x63%2C+0x6c%2C+0x61%2C+0x73%2C%0A%09%090x73%2C+0x69%2C+0x66%2C+0x69%2C+0x65%2C+0x64%2C+0x20%2C+0x77%2C%0A%09%090x69%2C+0x74%2C+0x68%2C+0x20%2C+0x77%2C+0x6f%2C+0x6c%2C+0x76%2C%0A%09%090x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x63%2C+0x6f%2C+0x79%2C+0x6f%2C%0A%09%090x74%2C+0x65%2C+0x73%2C+0x2c%2C+0x20%2C+0x6a%2C+0x61%2C+0x63%2C%0A%09%090x6b%2C+0x61%2C+0x6c%2C+0x73%2C+0x2c%2C+0x20%2C+0x61%2C+0x6e%2C%0A%09%090x64%2C+0x20%2C+0x66%2C+0x6f%2C+0x78%2C+0x65%2C+0x73%2C+0x20%2C%0A%09%090x69%2C+0x6e%2C+0x20%2C+0x74%2C+0x68%2C+0x65%2C+0x20%2C+0x74%2C%0A%09%090x61%2C+0x78%2C+0x6f%2C+0x6e%2C+0x6f%2C+0x6d%2C+0x69%2C+0x63%2C%0A%09%090x20%2C+0x66%2C+0x61%2C+0x6d%2C+0x69%2C+0x6c%2C+0x79%2C+0x20%2C%0A%09%090x43%2C+0x61%2C+0x6e%2C+0x69%2C+0x64%2C+0x61%2C+0x65%2C+0x2e%2C'
          4        DO_ICALL                                         $1      
          5        ASSIGN                                                   !0, $1
   42     6        INIT_FCALL                                               'preg_replace'
          7        SEND_VAL                                                 '%2F%5B%5E0-9a-f%5D%2F'
          8        SEND_VAL                                                 ''
          9        SEND_VAR                                                 !0
         10        DO_ICALL                                         $3      
         11        ASSIGN                                                   !0, $3
   43    12        INIT_FCALL                                               'hex2bin'
         13        SEND_VAR                                                 !0
         14        DO_ICALL                                         $5      
         15        ECHO                                                     $5
         16      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
139.35 ms | 1444 KiB | 16 Q