3v4l.org

run code in 150+ php & hhvm versions
Bugs & Features
<?php $contents = "hellowhatsupman!"; $pattern = "/^.*GET.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used GET method !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*include.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used include function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*include_once.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used include_once function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*require.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used require function !\n"; } else{ echo "It might not to be vulnerable !\n"; } $pattern = "/^.*require_once.*$/m"; if(preg_match_all($pattern, $contents, $matches)){ echo "You used require_once function !\n"; } else{ echo "It might not to be vulnerable !\n"; } ?>
Output for 4.3.0 - 5.6.28, hhvm-3.10.0 - 3.12.0, 7.0.0 - 7.1.0
It might not to be vulnerable ! It might not to be vulnerable ! It might not to be vulnerable ! It might not to be vulnerable ! It might not to be vulnerable !