Tools Blog Learn Quizzes Smile API Log In / Sign Up
Tools Blog Learn Quizzes Smile API Log In / Sign Up
« See all images and videos
We have updated our privacy policy to let you know that we use cookies to personalise content and ads. We also use cookies to analyse our traffic and we share information about your use of our site and application with our advertising and analytics partners. By using this website or our application you agree to our use of cookies. Learn more about the way this website uses cookies or remove this message.

A Halloween PHP Snippet

October 27, 2016

Here's the source code.

	$key = 'hihi';
        $iv = base64_decode( "+1dGNQRBFRzvFLSQ/+mgZQ==" );
        $enc = base64_decode( "sCCJ0V0cLYxo51EeF46JzRo1UJ4rt/lgLLwa72FAYFY=" );

        $verify = openssl_decrypt($enc, 'aes-256-cbc', $key, OPENSSL_RAW_DATA, $iv);

        echo $verify . PHP_EOL;
        //then if you feel brave execute eval($verify);

Load More Smileys


2017-07-25 - In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution. Read more ...
2017-07-25 - Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP before 5.6.30 and 7.0.x before 7.0.15 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. Read more ...

See All Entries...