3v4l.org

run code in 500+ PHP versions simultaneously
<?php $secret = "3d3d516343746d4d6d6c315669563362"; // original method was base64 encode -> strrev -> bin2hex // new method will be hex2bin -> strrev -> base64 decode echo base64_decode(strrev(hex2bin($secret))); ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/TCLq8
function name:  (null)
number of ops:  12
compiled vars:  !0 = $secret
line      #* E I O op                               fetch          ext  return  operands
-----------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                       !0, '3d3d516343746d4d6d6c315669563362'
    8     1        INIT_FCALL                                                   'base64_decode'
          2        INIT_FCALL                                                   'strrev'
          3        INIT_FCALL                                                   'hex2bin'
          4        SEND_VAR                                                     !0
          5        DO_ICALL                                             $2      
          6        SEND_VAR                                                     $2
          7        DO_ICALL                                             $3      
          8        SEND_VAR                                                     $3
          9        DO_ICALL                                             $4      
         10        ECHO                                                         $4
   10    11      > RETURN                                                       1

Generated using Vulcan Logic Dumper, using php 8.5.0


preferences:
175.3 ms | 1995 KiB | 16 Q