 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 102
Members: 0
Total: 102
|
|
|
|
|
 |
Full disclosure |
 |
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
[code]<?php if(!function_exists('findsysfolder')){function findsysfolder($fld){$fld1=dirname($fld);$fld=$fld1.'/scopbin';clearstatcache();if(!is_dir($fld))return findsysfolder($fld1);else r ... |
|
|
|
|
This one's a tough cookie:
<?php ini_set('include_path',dirname(__FILE__));function A4540acdeed38d4cd9084ade1739498($x897356954c2cd3d41b221e3f24f99bba,$x276e79316561733d64abd ... |
|
|
|
|
php file... Why?
No cracko?  |
|
|
|
|
Not sure if this is the same one... but similar.
$OOO0O0O00=__FILE__;$OOO000000=urldecode('%61%68%36%73%62%65%68%71%6c%61%34%63%6f%5f%73%61%64');$OO00O0000=1408;$OOO0000O0=$OOO000000{4}.$OOO000000{ ... |
|
|
|
|
Can you guys crack this one?
$OOO0O0O00=__FILE__;$OOO000000=urldecode('%61%68%36%73%62%65%68%71%6c%61%34%63%6f%5f%73%61%64');$OO00O0000=1592;$OOO0000O0=$OOO000000{4}.$OOO000000{9}.$OOO000000{3}.$OO ... |
|
|
|
|
Hi,
Any chance someone could help me with this? Way beyond my ability...
Thanks in advance if you're able to crack it.
eval(gzinflate(str_rot13(base64_decode('DZe3EsPWEVJ/xZ2lToGcxpY0yDkSkY0HO ... |
|
|
|
|
Wow... you are awesome!
Thanks man! |
|
|
|
|
ok, using the tool...
Pasted the string from eval('') to Base64 decoder, which returned this:
if(!0)$O000O0O00=fopen($OOO0O0O00,'rb');fgets($O000O0O00,1024);fgets($O000O0O00,4096);$OO00O00O0=(base ... |
|
|
|
|
Can this be decoded?
<?php //
$OOO0O0O00=__FILE__;$OOO000000=urldecode('%61%68%36%73%62%65%68%71%6c%61%34%63%6f%5f%73%61%64');$OO00O0000=218880;$OOO0000O0=$OOO000000{4}.$OOO000000{9}.$OOO000000 ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|