Waraxe IT Security Portal
Login or Register
November 25, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 43
Members: 0
Total: 43
Full disclosure
APPLE-SA-11-19-2024-5 macOS Sequoia 15.1.1
Local Privilege Escalations in needrestart
APPLE-SA-11-19-2024-4 iOS 17.7.2 and iPadOS 17.7.2
APPLE-SA-11-19-2024-3 iOS 18.1.1 and iPadOS 18.1.1
APPLE-SA-11-19-2024-2 visionOS 2.1.1
APPLE-SA-11-19-2024-1 Safari 18.1.1
Reflected XSS - fronsetiav1.1
XXE OOB - fronsetiav1.1
St. Poelten UAS | Path Traversal in Korenix JetPort 5601
St. Poelten UAS | Multiple Stored Cross-Site Scripting in SEH utnserver Pro
Apple web content filter bypass allows unrestricted access to blocked content (macOS/iOS/iPadOS/visionO S/watchOS)
SEC Consult SA-20241112-0 :: Multiple vulnerabilities in Siemens Energy Omnivise T3000 (CVE-2024-38876, CVE-2024-38877, CVE-2024-38878, CVE-2024-38879)
Security issue in the TX Text Control .NET Server for ASP.NET.
SEC Consult SA-20241107-0 :: Multiple Vulnerabilities in HASOMED Elefant and Elefant Software Updater
Unsafe eval() in TestRail CLI
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index
Search found 7 matches
Please help me decode this.
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:44 am Subject: Please help me decode this.
markehdotme
Replies: 1
Views: 5647




Here is the final result:


<?php if(!function_exists('get_post_templates')) { function get_post_templates() { $themes = get_themes(); $the ...
help on decoding this strange php
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:42 am Subject: help on decoding this strange php
markehdotme
Replies: 1
Views: 7520




The variables have been mass-replaced - it's impossible to get the originals back without knowing the algorithm that they used.

Otherwise, the code is there.
Obfuscated script decode request
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:40 am Subject: Obfuscated script decode request
markehdotme
Replies: 1
Views: 6921




Went to decode this... check your other thread.
Obfuscated script decode request
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 8:39 am Subject: Obfuscated script decode request
markehdotme
Replies: 2
Views: 6946




Wasn't that hard Smile Enjoy!

Old files are tagged with .old, just in case.

It is impossible to get the previous variable names back though, and I'm not bothered to go back through and add all the ...
thank you in advance :)
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:42 am Subject: thank you in advance :)
markehdotme
Replies: 1
Views: 5824




There is a few problems decoding this.

You'll see on line 19 the function name has been removed - so the source code has been tampered with.

Also, this is a bunch of functions, and ini_set's are ...
Thank you very much!
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:34 am Subject: Thank you very much!
markehdotme
Replies: 1
Views: 6214




Additional files are required:

- '/scopbin'
- '911006.php'

These should be in the same directory.
Help Me decode page
PostForum:PHP script decode requests Posted: Tue Mar 15, 2011 7:32 am Subject: Help Me decode page
markehdotme
Replies: 2
Views: 6470




Here you go Smile


<?php
// Veritabanını çekelim
include('config.php');
// Anti SQL İnjection Function By SeveNStyLe
FUNCTION v4guvenlik($text) {
...
Page 1 of 1
All times are GMT


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.054 Seconds