3v4l.org

run code in 300+ PHP versions simultaneously
<?php $contents = "GET"; $pattern = "/^.*GET.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used GET method !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*include.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used include function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*include_once.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used include_once function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*require.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used require function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*require_once.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used require_once function !\n"; } else{ echo "It might not to be vulnerable !\n"; } ?>

preferences:
33.43 ms | 402 KiB | 5 Q