3v4l.org

run code in 500+ PHP versions simultaneously
<?php // 1. Set your target (the ruutukf.com address from your screenshot) $to = "your-ga99i8uzel@ruutukf.com"; // 2. Set the "Spoofed" identity $subject = "URGENT: Your Prize Claim - Project Test"; $from = "admin@gigahertzgiveaways.co.uk"; // 3. Craft the headers (This is where the spoofing happens) $headers = "From: " . $from . "\r\n"; $headers .= "Reply-To: " . $from . "\r\n"; $headers .= "X-Mailer: PHP/" . phpversion(); // 4. The "Phishing" Body $message = "Congratulations! You have won the jackpot. Please reply to this email to claim your prize."; // 5. Execute the send if(mail($to, $subject, $message, $headers)) { echo "SUCCESS: The spoofed email has been sent to $to"; } else { echo "ERROR: The server blocked the mail() function."; } ?><?php // 1. Set your target (the ruutukf.com address from your screenshot) $to = "your-ga99i8uzel@ruutukf.com"; // 2. Set the "Spoofed" identity $subject = "URGENT: Your Prize Claim - Project Test"; $from = "admin@gigahertzgiveaways.co.uk"; // 3. Craft the headers (This is where the spoofing happens) $headers = "From: " . $from . "\r\n"; $headers .= "Reply-To: " . $from . "\r\n"; $headers .= "X-Mailer: PHP/" . phpversion(); // 4. The "Phishing" Body $message = "Congratulations! You have won the jackpot. Please reply to this email to claim your prize."; // 5. Execute the send if(mail($to, $subject, $message, $headers)) { echo "SUCCESS: The spoofed email has been sent to $to"; } else { echo "ERROR: The server blocked the mail() function."; } ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 25
Branch analysis from position: 21
1 jumps found. (Code = 42) Position 1 = 26
Branch analysis from position: 26
2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 51
Branch analysis from position: 47
1 jumps found. (Code = 42) Position 1 = 52
Branch analysis from position: 52
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 51
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 25
2 jumps found. (Code = 43) Position 1 = 47, Position 2 = 51
Branch analysis from position: 47
Branch analysis from position: 51
filename:       /in/n4pia
function name:  (null)
number of ops:  53
compiled vars:  !0 = $to, !1 = $subject, !2 = $from, !3 = $headers, !4 = $message
line      #* E I O op                               fetch          ext  return  operands
-----------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                       !0, 'your-ga99i8uzel%40ruutukf.com'
    6     1        ASSIGN                                                       !1, 'URGENT%3A+Your+Prize+Claim+-+Project+Test'
    7     2        ASSIGN                                                       !2, 'admin%40gigahertzgiveaways.co.uk'
   10     3        CONCAT                                               ~8      'From%3A+', !2
          4        CONCAT                                               ~9      ~8, '%0D%0A'
          5        ASSIGN                                                       !3, ~9
   11     6        CONCAT                                               ~11     'Reply-To%3A+', !2
          7        CONCAT                                               ~12     ~11, '%0D%0A'
          8        ASSIGN_OP                                         8          !3, ~12
   12     9        INIT_FCALL                                                   'phpversion'
         10        DO_ICALL                                             $14     
         11        CONCAT                                               ~15     'X-Mailer%3A+PHP%2F', $14
         12        ASSIGN_OP                                         8          !3, ~15
   15    13        ASSIGN                                                       !4, 'Congratulations%21+You+have+won+the+jackpot.+Please+reply+to+this+email+to+claim+your+prize.'
   18    14        INIT_FCALL                                                   'mail'
         15        SEND_VAR                                                     !0
         16        SEND_VAR                                                     !1
         17        SEND_VAR                                                     !4
         18        SEND_VAR                                                     !3
         19        DO_ICALL                                             $18     
         20      > JMPZ                                                         $18, ->25
   19    21    >   NOP                                                          
         22        FAST_CONCAT                                          ~19     'SUCCESS%3A+The+spoofed+email+has+been+sent+to+', !0
         23        ECHO                                                         ~19
   18    24      > JMP                                                          ->26
   21    25    >   ECHO                                                         'ERROR%3A+The+server+blocked+the+mail%28%29+function.'
   25    26    >   ASSIGN                                                       !0, 'your-ga99i8uzel%40ruutukf.com'
   28    27        ASSIGN                                                       !1, 'URGENT%3A+Your+Prize+Claim+-+Project+Test'
   29    28        ASSIGN                                                       !2, 'admin%40gigahertzgiveaways.co.uk'
   32    29        CONCAT                                               ~23     'From%3A+', !2
         30        CONCAT                                               ~24     ~23, '%0D%0A'
         31        ASSIGN                                                       !3, ~24
   33    32        CONCAT                                               ~26     'Reply-To%3A+', !2
         33        CONCAT                                               ~27     ~26, '%0D%0A'
         34        ASSIGN_OP                                         8          !3, ~27
   34    35        INIT_FCALL                                                   'phpversion'
         36        DO_ICALL                                             $29     
         37        CONCAT                                               ~30     'X-Mailer%3A+PHP%2F', $29
         38        ASSIGN_OP                                         8          !3, ~30
   37    39        ASSIGN                                                       !4, 'Congratulations%21+You+have+won+the+jackpot.+Please+reply+to+this+email+to+claim+your+prize.'
   40    40        INIT_FCALL                                                   'mail'
         41        SEND_VAR                                                     !0
         42        SEND_VAR                                                     !1
         43        SEND_VAR                                                     !4
         44        SEND_VAR                                                     !3
         45        DO_ICALL                                             $33     
         46      > JMPZ                                                         $33, ->51
   41    47    >   NOP                                                          
         48        FAST_CONCAT                                          ~34     'SUCCESS%3A+The+spoofed+email+has+been+sent+to+', !0
         49        ECHO                                                         ~34
   40    50      > JMP                                                          ->52
   43    51    >   ECHO                                                         'ERROR%3A+The+server+blocked+the+mail%28%29+function.'
   45    52    > > RETURN                                                       1

Generated using Vulcan Logic Dumper, using php 8.5.0


preferences:
169.88 ms | 1325 KiB | 15 Q