3v4l.org

run code in 300+ PHP versions simultaneously
<?php include"requirements.php"; include"search.php"; function run($target_name){ global $host; $nama=nama(); $random_userid=random(32); $create=create_device_id($random_userid); $authorization_sementara=json_decode($create,true)['authToken']; if($authorization_sementara==""){ echo "error authorization token is null\n"; } $save_profil=save_profile_request_v2($authorization_sementara,$random_userid); if(json_decode($save_profil,true)['isSuccess'] != true){ echo "error in save character line 28\n"; echo $save_profil; } $copy_character=copy_character_by_hashcode($authorization_sementara,$random_userid); $account_user_v5=curl(headerss($authorization_sementara,$random_userid) , 'https://gw-napi.zepeto.io/AccountUser_v5', '{"creatorAllItemsVersion":"_","creatorHotItemGroupId":"_","creatorHotItemsVersion":"_","creatorNewItemsVersion":"_","params":{"appVersion":"3.31.100","itemVersion":"_","language":"_","platform":"_"},"timeZone":"Asia/Bangkok"}'); $cari=search_userid($target_name); $userid=json_decode($cari,true)['userid']; $follow=follow($userid,$authorization_sementara,$random_userid); if(json_decode($follow,true)["isSuccess"]==true){ echo "follow success\n"; } /*$bio=curl(headerss($authorization_sementara,$random_userid),$host."/SaveProfileRequest_v2",'{"job":"","name":"'.$nama.'","nationality":"","statusMessage":"order panel di @zepetod_ofc (telegram)"}'); if(json_decode($bio,true)["isSuccess"]==true){ echo ", bio successfully added\n"; }*/ } function create_device_id($random){ global $host; $page="/DeviceAuthenticationRequest"; $send_curl=curl(headerss('',$random),$host."/DeviceAuthenticationRequest",'{"deviceId":"'.$random.'"}'); return $send_curl; } function save_profile_request_v2($authorization_sementara,$random_userid){ global $nama,$host; $name=$nama; //post method $run_curl=curl(headerss($authorization_sementara,$random_userid),$host."/SaveProfileRequest_v2",'{"job":"","name":"' . $name . '","nationality":"","statusMessage":""}'); return $run_curl; } function copy_character_by_hashcode($authorization_sementara,$random_userid){ global $host; $copy=curl(headerss($authorization_sementara,$random_userid),$host."/CopyCharacterByHashcode",'{"hashCode":"ZPT221","characterId":""}'); return $copy; } function follow($target,$authorization_sementara,$random_userid){ global $host; $follow=curl(headerss($authorization_sementara,$random_userid),$host."/FollowRequest_v2",'{"followUserId":"' . $target . '"}'); return $follow; } function search_userid($nama){ return search($nama); //file_get_contents("https://api.mrmajorexe.my.id/cari.php?username=$nama"); } function v2baru($nama){ $curl=search($nama); //file_get_contents("https://api.mrmajorexe.my.id/cari.php?username=$nama"); // echo $curl; return json_decode($curl,true)["follower"]; } //echo v2baru("syaiful");exit; if($argv[1]==""){ $username=readline("target id: "); $tg_follower=readline("jumlah add follower: "); //search target $search_target=search($username); $userid=json_decode($search_target,true)['userid']; $nickname=json_decode($search_target,true)["nama"]; $jumlah_awal=json_decode($search_target,true)["follower"]; //ringkasan $target=$tg_follower+$jumlah_awal; $sleep="20"; //account information echo " TARGET INFORMATION username : $nickname followers : $jumlah_awal target follower: $target unique userid : $userid "; //use passthru //echo "php follow.php false $username $userid $target $sleep"; passthru("php main.php false $username $userid $tg_follower $sleep"); exit; } //running script $target_name=$argv[2]; $userid=$argv[3]; $targetF=$argv[4]; $sleep=$argv[5]; for($i=1;$i<=$targetF;$i++){ echo run($target_name); } /* while(true){ // sleep(1); // $cek=v2baru($target_name); //if($cek>$targetF){ //echo "\033[1;31m success mencapai target!!\n"; //exit; //}else{ // echo "jumlah: $cek\n"; //} //for ($i = 1; $i <= $sleep; ++$i) { $pid = pcntl_fork(); if (!$pid) { //paste content disini echo run($target_name); exit($i); } } while (pcntl_waitpid(0, $status) != -1) { $status = pcntl_wexitstatus($status); } }*/
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 5, Position 2 = 60
Branch analysis from position: 5
1 jumps found. (Code = 79) Position 1 = -2
Branch analysis from position: 60
1 jumps found. (Code = 42) Position 1 = 75
Branch analysis from position: 75
2 jumps found. (Code = 44) Position 1 = 77, Position 2 = 70
Branch analysis from position: 77
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 70
2 jumps found. (Code = 44) Position 1 = 77, Position 2 = 70
Branch analysis from position: 77
Branch analysis from position: 70
filename:       /in/sMlcr
function name:  (null)
number of ops:  78
compiled vars:  !0 = $argv, !1 = $username, !2 = $tg_follower, !3 = $search_target, !4 = $userid, !5 = $nickname, !6 = $jumlah_awal, !7 = $target, !8 = $sleep, !9 = $target_name, !10 = $targetF, !11 = $i
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    2     0  E >   INCLUDE_OR_EVAL                                          'requirements.php', INCLUDE
    3     1        INCLUDE_OR_EVAL                                          'search.php', INCLUDE
   81     2        FETCH_DIM_R                                      ~14     !0, 1
          3        IS_EQUAL                                                 ~14, ''
          4      > JMPZ                                                     ~15, ->60
   82     5    >   INIT_FCALL_BY_NAME                                       'readline'
          6        SEND_VAL_EX                                              'target+id%3A+'
          7        DO_FCALL                                      0  $16     
          8        ASSIGN                                                   !1, $16
   83     9        INIT_FCALL_BY_NAME                                       'readline'
         10        SEND_VAL_EX                                              'jumlah+add+follower%3A+'
         11        DO_FCALL                                      0  $18     
         12        ASSIGN                                                   !2, $18
   85    13        INIT_FCALL_BY_NAME                                       'search'
         14        SEND_VAR_EX                                              !1
         15        DO_FCALL                                      0  $20     
         16        ASSIGN                                                   !3, $20
   87    17        INIT_FCALL                                               'json_decode'
         18        SEND_VAR                                                 !3
         19        SEND_VAL                                                 <true>
         20        DO_ICALL                                         $22     
         21        FETCH_DIM_R                                      ~23     $22, 'userid'
         22        ASSIGN                                                   !4, ~23
   88    23        INIT_FCALL                                               'json_decode'
         24        SEND_VAR                                                 !3
         25        SEND_VAL                                                 <true>
         26        DO_ICALL                                         $25     
         27        FETCH_DIM_R                                      ~26     $25, 'nama'
         28        ASSIGN                                                   !5, ~26
   89    29        INIT_FCALL                                               'json_decode'
         30        SEND_VAR                                                 !3
         31        SEND_VAL                                                 <true>
         32        DO_ICALL                                         $28     
         33        FETCH_DIM_R                                      ~29     $28, 'follower'
         34        ASSIGN                                                   !6, ~29
   91    35        ADD                                              ~31     !2, !6
         36        ASSIGN                                                   !7, ~31
   92    37        ASSIGN                                                   !8, '20'
   94    38        ROPE_INIT                                     9  ~35     '%0A++++TARGET+INFORMATION%0A%0A++++username+++++++%3A+'
   97    39        ROPE_ADD                                      1  ~35     ~35, !5
         40        ROPE_ADD                                      2  ~35     ~35, '%0A++++followers++++++%3A+'
   98    41        ROPE_ADD                                      3  ~35     ~35, !6
         42        ROPE_ADD                                      4  ~35     ~35, '%0A++++target+follower%3A+'
   99    43        ROPE_ADD                                      5  ~35     ~35, !7
         44        ROPE_ADD                                      6  ~35     ~35, '%0A++++unique+userid++%3A+'
  100    45        ROPE_ADD                                      7  ~35     ~35, !4
         46        ROPE_END                                      8  ~34     ~35, '%0A++++'
         47        ECHO                                                     ~34
  104    48        INIT_FCALL                                               'passthru'
         49        ROPE_INIT                                     8  ~41     'php+main.php+false+'
         50        ROPE_ADD                                      1  ~41     ~41, !1
         51        ROPE_ADD                                      2  ~41     ~41, '+'
         52        ROPE_ADD                                      3  ~41     ~41, !4
         53        ROPE_ADD                                      4  ~41     ~41, '+'
         54        ROPE_ADD                                      5  ~41     ~41, !2
         55        ROPE_ADD                                      6  ~41     ~41, '+'
         56        ROPE_END                                      7  ~40     ~41, !8
         57        SEND_VAL                                                 ~40
         58        DO_ICALL                                                 
  105    59      > EXIT                                                     
  113    60    >   FETCH_DIM_R                                      ~46     !0, 2
         61        ASSIGN                                                   !9, ~46
  114    62        FETCH_DIM_R                                      ~48     !0, 3
         63        ASSIGN                                                   !4, ~48
  115    64        FETCH_DIM_R                                      ~50     !0, 4
         65        ASSIGN                                                   !10, ~50
  116    66        FETCH_DIM_R                                      ~52     !0, 5
         67        ASSIGN                                                   !8, ~52
  118    68        ASSIGN                                                   !11, 1
         69      > JMP                                                      ->75
  119    70    >   INIT_FCALL                                               'run'
         71        SEND_VAR                                                 !9
         72        DO_FCALL                                      0  $55     
         73        ECHO                                                     $55
  118    74        PRE_INC                                                  !11
         75    >   IS_SMALLER_OR_EQUAL                                      !11, !10
         76      > JMPNZ                                                    ~57, ->70
  145    77    > > RETURN                                                   1

Function run:
Finding entry points
Branch analysis from position: 0
2 jumps found. (Code = 43) Position 1 = 21, Position 2 = 22
Branch analysis from position: 21
2 jumps found. (Code = 43) Position 1 = 34, Position 2 = 36
Branch analysis from position: 34
2 jumps found. (Code = 43) Position 1 = 74, Position 2 = 75
Branch analysis from position: 74
1 jumps found. (Code = 62) Position 1 = -2
Branch analysis from position: 75
Branch analysis from position: 36
Branch analysis from position: 22
filename:       /in/sMlcr
function name:  run
number of ops:  76
compiled vars:  !0 = $target_name, !1 = $host, !2 = $nama, !3 = $random_userid, !4 = $create, !5 = $authorization_sementara, !6 = $save_profil, !7 = $copy_character, !8 = $account_user_v5, !9 = $cari, !10 = $userid, !11 = $follow
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    7     0  E >   RECV                                             !0      
    8     1        BIND_GLOBAL                                              !1, 'host'
    9     2        INIT_FCALL_BY_NAME                                       'nama'
          3        DO_FCALL                                      0  $12     
          4        ASSIGN                                                   !2, $12
   10     5        INIT_FCALL_BY_NAME                                       'random'
          6        SEND_VAL_EX                                              32
          7        DO_FCALL                                      0  $14     
          8        ASSIGN                                                   !3, $14
   11     9        INIT_FCALL_BY_NAME                                       'create_device_id'
         10        SEND_VAR_EX                                              !3
         11        DO_FCALL                                      0  $16     
         12        ASSIGN                                                   !4, $16
   12    13        INIT_FCALL                                               'json_decode'
         14        SEND_VAR                                                 !4
         15        SEND_VAL                                                 <true>
         16        DO_ICALL                                         $18     
         17        FETCH_DIM_R                                      ~19     $18, 'authToken'
         18        ASSIGN                                                   !5, ~19
   13    19        IS_EQUAL                                                 !5, ''
         20      > JMPZ                                                     ~21, ->22
   14    21    >   ECHO                                                     'error+authorization+token+is+null%0A'
   16    22    >   INIT_FCALL_BY_NAME                                       'save_profile_request_v2'
         23        SEND_VAR_EX                                              !5
         24        SEND_VAR_EX                                              !3
         25        DO_FCALL                                      0  $22     
         26        ASSIGN                                                   !6, $22
   17    27        INIT_FCALL                                               'json_decode'
         28        SEND_VAR                                                 !6
         29        SEND_VAL                                                 <true>
         30        DO_ICALL                                         $24     
         31        FETCH_DIM_R                                      ~25     $24, 'isSuccess'
         32        BOOL_NOT                                         ~26     ~25
         33      > JMPZ                                                     ~26, ->36
   18    34    >   ECHO                                                     'error+in+save+character+line+28%0A'
   19    35        ECHO                                                     !6
   21    36    >   INIT_FCALL_BY_NAME                                       'copy_character_by_hashcode'
         37        SEND_VAR_EX                                              !5
         38        SEND_VAR_EX                                              !3
         39        DO_FCALL                                      0  $27     
         40        ASSIGN                                                   !7, $27
   22    41        INIT_FCALL_BY_NAME                                       'curl'
         42        INIT_FCALL_BY_NAME                                       'headerss'
         43        SEND_VAR_EX                                              !5
         44        SEND_VAR_EX                                              !3
         45        DO_FCALL                                      0  $29     
         46        SEND_VAR_NO_REF_EX                                       $29
         47        SEND_VAL_EX                                              'https%3A%2F%2Fgw-napi.zepeto.io%2FAccountUser_v5'
         48        SEND_VAL_EX                                              '%7B%22creatorAllItemsVersion%22%3A%22_%22%2C%22creatorHotItemGroupId%22%3A%22_%22%2C%22creatorHotItemsVersion%22%3A%22_%22%2C%22creatorNewItemsVersion%22%3A%22_%22%2C%22params%22%3A%7B%22appVersion%22%3A%223.31.100%22%2C%22itemVersion%22%3A%22_%22%2C%22language%22%3A%22_%22%2C%22platform%22%3A%22_%22%7D%2C%22timeZone%22%3A%22Asia%2FBangkok%22%7D'
         49        DO_FCALL                                      0  $30     
         50        ASSIGN                                                   !8, $30
   23    51        INIT_FCALL_BY_NAME                                       'search_userid'
         52        SEND_VAR_EX                                              !0
         53        DO_FCALL                                      0  $32     
         54        ASSIGN                                                   !9, $32
   24    55        INIT_FCALL                                               'json_decode'
         56        SEND_VAR                                                 !9
         57        SEND_VAL                                                 <true>
         58        DO_ICALL                                         $34     
         59        FETCH_DIM_R                                      ~35     $34, 'userid'
         60        ASSIGN                                                   !10, ~35
   25    61        INIT_FCALL_BY_NAME                                       'follow'
         62        SEND_VAR_EX                                              !10
         63        SEND_VAR_EX                                              !5
         64        SEND_VAR_EX                                              !3
         65        DO_FCALL                                      0  $37     
         66        ASSIGN                                                   !11, $37
   26    67        INIT_FCALL                                               'json_decode'
         68        SEND_VAR                                                 !11
         69        SEND_VAL                                                 <true>
         70        DO_ICALL                                         $39     
         71        FETCH_DIM_R                                      ~40     $39, 'isSuccess'
         72        BOOL                                             ~41     ~40
         73      > JMPZ                                                     ~41, ->75
   27    74    >   ECHO                                                     'follow+success%0A'
   33    75    > > RETURN                                                   null

End of function run

Function create_device_id:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  create_device_id
number of ops:  18
compiled vars:  !0 = $random, !1 = $host, !2 = $page, !3 = $send_curl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   35     0  E >   RECV                                             !0      
   36     1        BIND_GLOBAL                                              !1, 'host'
   37     2        ASSIGN                                                   !2, '%2FDeviceAuthenticationRequest'
   38     3        INIT_FCALL_BY_NAME                                       'curl'
          4        INIT_FCALL_BY_NAME                                       'headerss'
          5        SEND_VAL_EX                                              ''
          6        SEND_VAR_EX                                              !0
          7        DO_FCALL                                      0  $5      
          8        SEND_VAR_NO_REF_EX                                       $5
          9        CONCAT                                           ~6      !1, '%2FDeviceAuthenticationRequest'
         10        SEND_VAL_EX                                              ~6
         11        CONCAT                                           ~7      '%7B%22deviceId%22%3A%22', !0
         12        CONCAT                                           ~8      ~7, '%22%7D'
         13        SEND_VAL_EX                                              ~8
         14        DO_FCALL                                      0  $9      
         15        ASSIGN                                                   !3, $9
   39    16      > RETURN                                                   !3
   40    17*     > RETURN                                                   null

End of function create_device_id

Function save_profile_request_v2:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  save_profile_request_v2
number of ops:  20
compiled vars:  !0 = $authorization_sementara, !1 = $random_userid, !2 = $nama, !3 = $host, !4 = $name, !5 = $run_curl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   42     0  E >   RECV                                             !0      
          1        RECV                                             !1      
   43     2        BIND_GLOBAL                                              !2, 'nama'
          3        BIND_GLOBAL                                              !3, 'host'
   44     4        ASSIGN                                                   !4, !2
   46     5        INIT_FCALL_BY_NAME                                       'curl'
          6        INIT_FCALL_BY_NAME                                       'headerss'
          7        SEND_VAR_EX                                              !0
          8        SEND_VAR_EX                                              !1
          9        DO_FCALL                                      0  $7      
         10        SEND_VAR_NO_REF_EX                                       $7
         11        CONCAT                                           ~8      !3, '%2FSaveProfileRequest_v2'
         12        SEND_VAL_EX                                              ~8
         13        CONCAT                                           ~9      '%7B%22job%22%3A%22%22%2C%22name%22%3A%22', !4
         14        CONCAT                                           ~10     ~9, '%22%2C%22nationality%22%3A%22%22%2C%22statusMessage%22%3A%22%22%7D'
         15        SEND_VAL_EX                                              ~10
         16        DO_FCALL                                      0  $11     
         17        ASSIGN                                                   !5, $11
   48    18      > RETURN                                                   !5
   49    19*     > RETURN                                                   null

End of function save_profile_request_v2

Function copy_character_by_hashcode:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  copy_character_by_hashcode
number of ops:  16
compiled vars:  !0 = $authorization_sementara, !1 = $random_userid, !2 = $host, !3 = $copy
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   51     0  E >   RECV                                             !0      
          1        RECV                                             !1      
   53     2        BIND_GLOBAL                                              !2, 'host'
   55     3        INIT_FCALL_BY_NAME                                       'curl'
          4        INIT_FCALL_BY_NAME                                       'headerss'
          5        SEND_VAR_EX                                              !0
          6        SEND_VAR_EX                                              !1
          7        DO_FCALL                                      0  $4      
          8        SEND_VAR_NO_REF_EX                                       $4
          9        CONCAT                                           ~5      !2, '%2FCopyCharacterByHashcode'
         10        SEND_VAL_EX                                              ~5
         11        SEND_VAL_EX                                              '%7B%22hashCode%22%3A%22ZPT221%22%2C%22characterId%22%3A%22%22%7D'
         12        DO_FCALL                                      0  $6      
         13        ASSIGN                                                   !3, $6
   56    14      > RETURN                                                   !3
   57    15*     > RETURN                                                   null

End of function copy_character_by_hashcode

Function follow:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  follow
number of ops:  19
compiled vars:  !0 = $target, !1 = $authorization_sementara, !2 = $random_userid, !3 = $host, !4 = $follow
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   58     0  E >   RECV                                             !0      
          1        RECV                                             !1      
          2        RECV                                             !2      
   60     3        BIND_GLOBAL                                              !3, 'host'
   62     4        INIT_FCALL_BY_NAME                                       'curl'
          5        INIT_FCALL_BY_NAME                                       'headerss'
          6        SEND_VAR_EX                                              !1
          7        SEND_VAR_EX                                              !2
          8        DO_FCALL                                      0  $5      
          9        SEND_VAR_NO_REF_EX                                       $5
         10        CONCAT                                           ~6      !3, '%2FFollowRequest_v2'
         11        SEND_VAL_EX                                              ~6
         12        CONCAT                                           ~7      '%7B%22followUserId%22%3A%22', !0
         13        CONCAT                                           ~8      ~7, '%22%7D'
         14        SEND_VAL_EX                                              ~8
         15        DO_FCALL                                      0  $9      
         16        ASSIGN                                                   !4, $9
   64    17      > RETURN                                                   !4
   65    18*     > RETURN                                                   null

End of function follow

Function search_userid:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  search_userid
number of ops:  6
compiled vars:  !0 = $nama
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   67     0  E >   RECV                                             !0      
   69     1        INIT_FCALL_BY_NAME                                       'search'
          2        SEND_VAR_EX                                              !0
          3        DO_FCALL                                      0  $1      
          4      > RETURN                                                   $1
   70     5*     > RETURN                                                   null

End of function search_userid

Function v2baru:
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/sMlcr
function name:  v2baru
number of ops:  12
compiled vars:  !0 = $nama, !1 = $curl
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
   72     0  E >   RECV                                             !0      
   73     1        INIT_FCALL_BY_NAME                                       'search'
          2        SEND_VAR_EX                                              !0
          3        DO_FCALL                                      0  $2      
          4        ASSIGN                                                   !1, $2
   75     5        INIT_FCALL                                               'json_decode'
          6        SEND_VAR                                                 !1
          7        SEND_VAL                                                 <true>
          8        DO_ICALL                                         $4      
          9        FETCH_DIM_R                                      ~5      $4, 'follower'
         10      > RETURN                                                   ~5
   76    11*     > RETURN                                                   null

End of function v2baru

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
153.75 ms | 1038 KiB | 16 Q