Waraxe IT Security Portal
Login or Register
May 1, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 70
Members: 0
Total: 70
Full disclosure
Microsoft Windows .XRM-MS File / NTLM Information DisclosureSpoofing
[IWCC 2025] CfP: 14th International Workshop on Cyber Crime -Ghent, Belgium, Aug 11-14, 2025
Inedo ProGet Insecure Reflection and CSRF Vulnerabilities
Ruby on Rails Cross-Site Request Forgery
Microsoft ".library-ms" File / NTLM Information Disclosure (Resurrected 2025)
HNS-2025-10 - HN Security Advisory - Local privilege escalation in Zyxel uOS
APPLE-SA-04-16-2025-4 visionOS 2.4.1
APPLE-SA-04-16-2025-3 tvOS 18.4.1
APPLE-SA-04-16-2025-2 macOS Sequoia 15.4.1
APPLE-SA-04-16-2025-1 iOS 18.4.1 and iPadOS 18.4.1
Business Logic Flaw: Price Manipulation - AlegroCartv1.2.9
Stored XSS in "Message" Functionality - AlegroCartv1.2.9
XSS via SVG Image Upload - AlegroCartv1.2.9
BBOT 2.1.0 - Local Privilege Escalation via Malicious ModuleExecution
83 vulnerabilities in Vasion Print / PrinterLogic
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 7 matches
Please help me decode this.
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:44 am Subject: Please help me decode this.
markehdotme
Replies: 1
Views: 6002




Here is the final result:


<?php if(!function_exists('get_post_templates')) { function get_post_templates() { $themes = get_themes(); $the ...
help on decoding this strange php
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:42 am Subject: help on decoding this strange php
markehdotme
Replies: 1
Views: 8415




The variables have been mass-replaced - it's impossible to get the originals back without knowing the algorithm that they used.

Otherwise, the code is there.
Obfuscated script decode request
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:40 am Subject: Obfuscated script decode request
markehdotme
Replies: 1
Views: 7739




Went to decode this... check your other thread.
Obfuscated script decode request
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:39 am Subject: Obfuscated script decode request
markehdotme
Replies: 2
Views: 7349




Wasn't that hard Smile Enjoy!

Old files are tagged with .old, just in case.

It is impossible to get the previous variable names back though, and I'm not bothered to go back through and add all the ...
thank you in advance :)
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:42 am Subject: thank you in advance :)
markehdotme
Replies: 1
Views: 6209




There is a few problems decoding this.

You'll see on line 19 the function name has been removed - so the source code has been tampered with.

Also, this is a bunch of functions, and ini_set's are ...
Thank you very much!
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:34 am Subject: Thank you very much!
markehdotme
Replies: 1
Views: 6583




Additional files are required:

- '/scopbin'
- '911006.php'

These should be in the same directory.
Help Me decode page
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:32 am Subject: Help Me decode page
markehdotme
Replies: 2
Views: 6907




Here you go Smile


<?php
// Veritabanını çekelim
include('config.php');
// Anti SQL İnjection Function By SeveNStyLe
FUNCTION v4guvenlik($text) {
...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.037 Seconds