3v4l.org

run code in 300+ PHP versions simultaneously
#!/usr/bin/env php <?php $cookie = 's%3A23%3A%22ESC_servicin.notifdisbu%22%3B'; $d = urldecode($cookie); echo unserialize($d);
Finding entry points
Branch analysis from position: 0
1 jumps found. (Code = 62) Position 1 = -2
filename:       /in/tVgFp
function name:  (null)
number of ops:  10
compiled vars:  !0 = $cookie, !1 = $d
line      #* E I O op                           fetch          ext  return  operands
-------------------------------------------------------------------------------------
    3     0  E >   ASSIGN                                                   !0, 's%253A23%253A%2522ESC_servicin.notifdisbu%2522%253B'
    5     1        INIT_FCALL                                               'urldecode'
          2        SEND_VAR                                                 !0
          3        DO_ICALL                                         $3      
          4        ASSIGN                                                   !1, $3
    6     5        INIT_FCALL                                               'unserialize'
          6        SEND_VAR                                                 !1
          7        DO_ICALL                                         $5      
          8        ECHO                                                     $5
          9      > RETURN                                                   1

Generated using Vulcan Logic Dumper, using php 8.0.0


preferences:
165.92 ms | 1398 KiB | 17 Q