Thursday, April 10, 2014

myphpguard 1.5 php obfuscator

myphpguard 1.5, new version available for free download.

New in this version:

- Improved generated code, for work with javascript and html.
- Added support for shell type comments.
- Fixed some issues deleting comments.
- Added support for more features of php code inside strings.

All these new improvements you can test in the demo
that comes with the installer or zip of the php obfuscator.

Friday, March 14, 2014

Myphpguard 1.4 php obfuscator


New stable version available, myphpguard 1.4, free php obfuscator.

New features and fix some issues:


- Added support for interfaces.
- Added option to rename classes and interfaces.
- Added partial support for strings within eval-constructions.
- Fixed a problem with the encoding.
- Added option to set the encoding of the resulting code.
- We have implemented a new method to recognize
element names thus have fixed many errors.




Tuesday, November 13, 2012

MYPHPGUARD free php obfuscator UPDATE


There is a new release of Myphpguard. This is a good free php obfuscator and encoder.

This new version of obfuscator has few changes:
- There are no limits to the number of files in the project.
- Fixed some bugs when processing php files.

Also available is an installer for Windows.

INSTALLATION
For Windows 98/Me/XP and later:
  1. Download the installer.
  2. Double-click the installer file to run it. 
For others platforms with Mono 2.8.x
  1. Download the zip with binary files, extract it to any folder.
  2. Execute the command  mono  EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator. 
DOWNLOAD LINKS

Myphpguard installer + portable 1.3.54d

http://www.mediafire.com/?2pnh2pjk87c9rhd


Myphpguard windows installer (.msi)


Myphpguard portable (.zip) for .net and mono

How to use the php obfuscator 







Know issues

There are known issues when using this php obfuscator. 1)Static strings and advanced obfucation static $name="php name"; result not work static $x355=myfunc(); In this case disable "Use Advanced Obfuscation for String and varnames". 2)Varname Hiding and Superglobals within functions or class methods function Test() { echo $_POST['data']; } result: function x545(){ echo ${myfunc()}[myfunc()]; } Here ${myfunc()} don't work To solve this just uncheck "Enable var Names Hiding" 3)Variables ${'Name'} result: $ft45{myfunc()} don't work If anyone has any other problems with this obfuscator can report me. Meanwhile we will continue working to improve this program.



Thursday, April 12, 2012

Myphpguard a free php obfuscator and encoder v1.354

Description

Myphpguard is an obfuscator and encoder tool that will help you protect php code easily. It renames variables, functions, fields and methods. Hides and encode all strings and Superglobals($_GET,$_SERVER,...). MyPhpGuard process all files from selected project folder into a single step maintaining the consistency between dependent files(-requires and -includes).


Main features include:
  1. You can save, open and create new projects using the File Menu or click the respective button from toolbar.
  2. This obfuscator renames variables, functions, methods from classes.
  3. Hides all strings and Superglobals, also variable names.(optional)
  4. Encode strings and variable names with base64.(optional)
  5. Delete all comments (Support only for c/c++ style comments).
  6. Include custom setting for particular variables, functions, fields and methods.
  7. You can select generate mapping files for obfuscated files and can reuse this mapping files for others projects.
  8. Do not support variable functions.
  9. If use string hiding with static strings, result code will not work.( static $var1="select";)
  10. Myphpguard is a multiplatform obfuscator-encoder, work on any OS with .Net Framework(2.0 or higher) or Mono 2.x (version 1.35 require Mono 2.8).
INSTALLATION
For Windows 98/Me/XP and later:
  1. Download the installer.
  2. Double-click the installer file to run it. 
For others platforms with Mono 2.8.x
  1. Download the zip with binary files, extract it to any folder.
  2. Execute the command  mono  EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator. 
DOWNLOAD LINKS
  1. Php obfuscator and examples - link A
  2. Download free php obfuscator encoder and examples - link B

Example

The following files show an example using the php obfuscator myphpguard 1.354: alltest.php, exfuncs.php, exvars.php. The file alltest.php include references to variables and functions from exvars.php and exfuncs, respectively.

alltest.php


<?php
include "exfuncs.php";
include "./exvars.php";
echo "<HTML><HEAD><TITLE>$title</TITLE></HEAD><BODY>";

echo getElementH2($title);
//*** String Test
//$cadena1="String Test";
$cadena2='Multiple Line:
-$cadena1

-$cadena2';

$cadena3="\"$test1\" $cadena2";
addElementH3($test1);
echo "$cadena3.</br>";


function AddTestForm()
{
   echo '<form method="post" action="#" >
         <p>Texto:</p>
         <input id="Texto" type="text" style="width: 250px" name="Texto" />
         <input id="subEnviar" type="submit" value="Send" name="subMsg" />

         </form>';
}
//*** Class Test

/*
*
*
* Class Lista
*/

class Lista
{
    private $myList;
    private $cadena;
    private $style;

    public function Lista($uLista,$style="")
    {
        $this->myList=$uLista;
        $this->style=$style;
    }

    public function ShowLista()
    {
        if(!isset($this->myList) )
        {
           return;
        }
        //

        $this->cadena="<ol style='$this->style' >";
        $this->AddElements();
        $this->cadena.="</ol>";
        echo $this->cadena;
    }

    private function AddElements()
    {
         if(count($this->myList)>10)
         {
             return;
         }

         foreach ($this->myList as $item)
         {
            $this->cadena.="<li>$item</li>";
         }
    }

}
addElementH3($test2);

$style="color: #cccccc;";
$colorLista=new Lista($elementos,$style);
$Lista=new Lista($elementos);


?>
<div><?php $colorLista->ShowLista(); ?> </div> <div><?php echo "<hr>";

$Lista->ShowLista(); ?> </div>
<?php
//*** Form Test
addElementH3($test3);
AddTestForm();

if( isset($_POST["subMsg"]) )
{
   if(!empty($_POST["Texto"]))
   {
       $texto=$_POST["Texto"];
       echo "<div style='border: 1px solid gray' >

       Texto:$texto
       </div>";
   }

}

echo '</BODY></HTML>';
?>

exvars.php

<?php

$title="Myphpguard obfuscator - All test";
$test1="String Test";

$test2="Class Test";
$test3="Form Test";

$nroElementos=4;

$elementos=array(1=>"item1",2=>"item2",3=>"<b>elemento</b>",9=>"item9");


/*
function err()
{
   return "sssdd";
}
*/
?>

exfuncs.php

<?php

function getElementH2($cadena)
{
   return '<H2>'.$cadena.'</H2>';
}


function addElementH3($cadena)
{
   echo "<H3>$cadena</H3><hr>";
}

?>
Now, show the obfuscated files generated for the php obfuscator Myphpguard 1.354.

Obfuscated alltest.php - Test A:

Advanced string obfuscation disabled.
<?php

include "\x65\x78\x66u\x6e\x63\x73.\x70\x68\x70";include "\x2e\x2f\x65x\x76\x61\x72s\x2e\x70\x68\x70";echo "\x3c\x48\x54M\x4c>\x3cH\x45\x41\x44><\x54\x49\x54L\x45>"."$xl3s2235"."\x3c\x2f\x54I\x54\x4c\x45>\x3c\x2f\x48\x45A\x44>\x3cB\x4f\x44\x59>";

echo xl2s155($xl3s2235);
$PFRJVx="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32"
;$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236"."\x2e\x3c\x2fb\x72>"; function xl1s155(){

echo "\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e"
;}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) )
{return;}$this->xl1s157="\x3c\x6f\x6c \x73\x74\x79l\x65\x3d\x27"."$this->xl1s158"."\x27\x20>";$this->xl1s161();$this->xl1s157.="\x3c\x2f\x6fl>";echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10)
{return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.="\x3c\x6c\x69>"."$xl1s6235"."\x3c\x2f\x6ci>";}}}xl2s156($xl3s2237);$xl1s7236="\x63\x6f\x6co\x72\x3a\x20#\x63\x63\x63\x63c\x63\x3b";$xl1s7237=new Lista($xl3s2240,$xl1s7236);

$xl1s7239=new Lista($xl3s2240);
?>
<div>
<?php $xl1s7237->xlz11(); ?>

 </div> <div>
<?php echo "\x3c\x68\x72>";
$xl1s7239->xlz11(); ?>

 </div>
<?php
xl2s156($xl3s2238);xl1s155();if( isset(${"_\x50\x4f\x53T"}["\x73\x75\x62M\x73\x67"]) ){if(!empty(${"\x5fP\x4fS\x54"}["\x54\x65\x78t\x6f"])){$xl1s10236=${"_\x50O\x53T"}["\x54\x65\x78t\x6f"];

echo "\x3c\x64\x69v\x20\x73\x74y\x6c\x65\x3d\x27b\x6f\x72\x64e\x72\x3a\x201\x70\x78 \x73\x6f\x6c\x69\x64 \x67r\x61y\x27 >
\x20 \x20 \x20 \x20\x54\x65\x78t\x6f:"."$xl1s10236"."
\x20 \x20\x20\x20 \x20\x3c\x2f\x64i\x76>"
;}}echo "\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e";

?>

Obfuscated alltest.php - Test B:

Advanced string obfuscation enabled, encode string disabled and variable names hiding disabled.
<?php if(!function_exists("xl1s44")){class xl1s21 { static $xl1s202="\x65x\x66un\x63s.\x70h\x70"; static $xl1s225=".\x2fex\x76a\x72\x73.p\x68p"; static $xl1s248="\x3c\x48T\x4dL\x3e\x3c\x48EA\x44>\x3c\x54IT\x4cE\x3e"; static $xl1s271="<\x2fT\x49\x54L\x45><\x2f\x48E\x41D>\x3c\x42\x4f\x44\x59>"; static $xl1s294="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32";

static $xl1s317="\x2e</\x62r>"; static $xl1s340="\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e";
static $xl1s363="<o\x6c s\x74y\x6c\x65='"; static $xl1s386="\x27\x20\x3e"; static $xl1s409="</\x6fl\x3e"; static $xl1s432="\x3cli\x3e"; static $xl1s455="</\x6c\x69\x3e"; static $xl1s478="\x63o\x6cor\x3a\x20#c\x63\x63c\x63c\x3b"; static $xl1s501="<h\x72>"; static $xl1s524="s\x75\x62M\x73g"; static $xl1s547="Te\x78\x74\x6f";

static $xl1s570="T\x65x\x74o"; static $xl1s593="<d\x69v \x73t\x79\x6c\x65=\x27bo\x72de\x72: \x31px\x20\x73ol\x69d \x67r\x61y'\x20>\xd
 \x20\x20 \x20\x20 T\x65x\x74\x6f:"; static $xl1s616="

\xa\x20\x20 \x20 \x20 \x3c\x2fd\x69v>"; static $xl1s639="\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e";
}eval("e\x76\x61\x6c\x28b\x61s\x656\x34\x5f\x64e\x63o\x64e\x28\x27\x5anV\x75Y3R\x70b24\x67e\x47wx\x63\x7aQ\x30KCR\x34\x62\x44FzN\x6aUp\x49Hty\x5a\x58\x521c\x6d4ge\x47\x77xc\x7aIxO\x6aoke\x79R7\x49nh\x73X\x48gzM\x58Nc\x65DM\x32XHg\x7aNSJ\x39\x66Tt\x39\x27\x29\x29\x3b");}
include xl1s44("x\x6c1s2\x302");include xl1s44("xl1\x73\x322\x35");echo xl1s44("x\x6c1\x73\x324\x38")."$xl3s2235".xl1s44("xl1\x73271");echo xl2s155($xl3s2235);$PFRJVx=xl1s44("x\x6c\x31s\x3294");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";
xl2s156($xl3s2236);echo "$xl1s2236".xl1s44("xl1\x733\x31\x37"); function xl1s155(){echo xl1s44("x\x6c1s3\x340");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){

$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=xl1s44("\x78\x6c\x31\x73\x33\x363")."$this->xl1s158".xl1s44("xl\x31s\x3386");

$this->xl1s161();$this->xl1s157.=xl1s44("\x78l1\x7340\x39");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.=xl1s44("xl\x31s43\x32")."$xl1s6235".xl1s44("\x78l\x31\x73455");
}}}xl2s156($xl3s2237);$xl1s7236=xl1s44("xl\x31s4\x378");$xl1s7237=new Lista($xl3s2240,$xl1s7236);$xl1s7239=new Lista($xl3s2240);

?>
<div>
<?php $xl1s7237->xlz11(); ?>
 </div> <div>

<?php echo xl1s44("\x78l1s\x350\x31");
$xl1s7239->xlz11(); ?>
 </div>
<?php

xl2s156($xl3s2238);xl1s155();if( isset($_POST[xl1s44("xl\x31\x73\x3524")]) ){if(!empty($_POST[xl1s44("\x78l\x31s54\x37")])){$xl1s10236=$_POST[xl1s44("xl\x31s5\x370")];echo xl1s44("\x78\x6c\x31\x7359\x33")."$xl1s10236".xl1s44("xl1\x736\x316")
;}}echo xl1s44("x\x6c1s\x3639");

?>

Obfuscated alltest.php - Test C:

Advanced string obfuscation enabled (array mode), encode string with base64 enabled and variable names hiding enabled.
<?php if(!function_exists("xl1s47")){${"G\x4cO\x42A\x4c\x53"} ["xl\x31\x7321"]= array( "xl1s282"=>"ZXh\x6dd\x575\x6ac\x795wa\x48A\x3d", "xl1s180"=>"x\x6c1s\x37\x39", "xl1s383"=>"Li9\x6ceHZ\x68cn\x4ducG\x68w", "xl1s484"=>"PE\x68\x55T\x55\x77\x2bPEh\x46Q\x55Q+\x50F\x52JVE\x78FP\x67=\x3d", "xl1s178"=>"b\x61\x73e\x36\x34\x5fde\x63o\x64e", "xl1s585"=>"PC\x39USV\x52MRT\x348\x4c\x30hF\x51U\x51+P\x45JP\x52Fk\x2b",

"xl1s179"=>"\x78\x6c1s\x347", "xl1s688"=>"TX\x56s\x64\x47lwb\x47UgT\x47l\x75Z\x54oN\x43i0k\x592\x46kZ\x575\x68MQ\x30\x4bLS\x52jYW\x52lb\x6dE\x79", "xl1s789"=>"\x4cjw\x76YnI\x2b", "xl1s890"=>"PG\x5avcm\x30gb\x57V\x30aG9\x6b\x50\x53Jw\x62\x33\x4e\x30IiB\x68\x59\x33Rpb\x32\x349I\x69Mi\x49\x444N\x43\x69Ag\x49CAg\x49C\x41g\x49\x44xw\x50\x6cR\x6ceHR\x76\x4fjw\x76cD\x34\x4e\x43i\x41gI\x43AgI\x43Ag\x49Dxp\x62n\x421dC\x42p\x5aD0i\x56G\x564\x64G8\x69I\x48R5c\x47U\x39In\x52l\x65\x48QiI\x48\x4e0eW\x78lPS\x4a\x33aWR\x30aDo\x67M\x6aUwc\x48\x67i\x49\x475\x68b\x57U9I\x6c\x52le\x48Rv\x49iA\x76Pg0\x4bI\x43A\x67I\x43\x41gIC\x41gPG\x6c\x75cH\x56\x30I\x47\x6ck\x50SJz\x64WJ\x46bn\x5a\x70\x59X\x49iI\x48\x525cG\x559\x49n\x4e1Y\x6d\x31pdC\x49\x67dmF\x73dWU\x39I\x6cN\x6cbmQ\x69IG5\x68b\x57U9\x49nN\x31Yk1\x7aZy\x49\x67\x4cz4\x4e\x43i\x41gI\x43\x41\x67\x49CAg\x49Dwv\x5am9\x79bT4\x3d",
"xl1s991"=>"\x50G\x39s\x49HN\x30e\x57\x78lP\x53\x63\x3d", "xl1s1092"=>"Jy\x41+", "xl1s1193"=>"\x50C9v\x62D4\x3d", "xl1s1294"=>"PG\x78\x70P\x67\x3d=", "xl1s1395"=>"P\x439\x73\x61T\x34\x3d", "xl1s1497"=>"Y29\x73b3\x496IC\x4ejY\x32Nj\x592\x4d7", "xl1s1396"=>"eG\x77xc\x7acy\x4dz\x59=", "xl1s1600"=>"PGh\x79P\x67\x3d\x3d",

"xl1s181"=>"X1\x42\x50\x55\x31Q\x3d", "xl1s1702"=>"c3V\x69TXN\x6e", "xl1s1803"=>"V\x47\x564\x64G8\x3d", "xl1s1904"=>"VGV\x34d\x47\x38=", "xl1s2005"=>"P\x47Rpd\x69Bz\x64\x48lsZ\x540n\x59m9y\x5a\x47Vy\x4f\x69Ax\x63\x48ggc\x329sa\x57\x51g\x5a3Jh\x65Sc\x67Pg\x30KI\x43AgI\x43AgI\x46\x52leH\x52vO\x67==", "xl1s2106"=>"DQo\x67\x49C\x41g\x49\x43A\x67P\x439k\x61XY+",

"xl1s2207"=>"P\x439\x43\x540R\x5aPj\x77v\x53FRN\x54\x444=",  "h1lI"=>"r1256");eval("\x65\x76a\x6c\x28b\x61\x73\x65\x36\x34_\x64e\x63\x6fd\x65\x28\x27Z\x6eV\x75Y\x33Rpb\x324g\x65\x47wxc\x7ac5\x4b\x43R\x34b\x44F\x7a\x4dTAw\x4bXsk\x65\x79J4b\x46x4\x4dzFc\x65D\x63zMT\x46ceD\x4dx\x49n09\x4aHsi\x520xc\x65DRm\x51k\x46\x4dXHg\x31M\x79J\x39\x57yJ4\x62F\x784M\x7aF\x7a\x4dlx4\x4dzE\x69\x58V\x73i\x65\x47\x78\x63\x65\x44M\x78c\x31x4\x4d\x7aE\x33XH\x67\x7aO\x43\x4adO\x33\x4aldH\x56\x79bi\x41ke\x79\x4a\x63eDc\x34b\x44\x46c\x65\x44czM\x56x4\x4dzEx\x49\x6e0\x6fJH\x73i\x58\x48g0N\x31x4\x4eGN\x50Ql\x78\x34ND\x46\x63\x65\x44R\x6aUyJ\x39WyJ\x63eD\x634bD\x46\x7a\x58H\x67z\x4djEi\x58\x56\x73\x6beyJ\x63eDc\x34bFx\x34\x4dzF\x7aXHg\x7aM\x54A\x77I\x6e1\x64KTt\x39\x27\x29\x29\x3b\x65v\x61l\x28b\x61\x73e\x364\x5f\x64e\x63\x6f\x64\x65\x28\x27Z\x6e\x56uY\x33\x52p\x622\x34ge\x47wx\x63zQ3\x4bCR\x34bD\x46\x7a\x4ejgp\x653Jl\x64HVy\x62i\x41k\x65yJH\x54E9c\x65DQy\x58H\x670\x4dUxT\x49n\x31bI\x6e\x68\x63eD\x5ajM\x58M\x79\x58Hg\x7aMSJ\x64Wy\x527In\x68s\x4d\x56x4N\x7a\x4d2O\x43\x4a9XT\x749\x27\x29\x29\x3b");}
include ${"\x47\x4cO\x42A\x4cS"}["xl1\x7321"]["xl\x31s\x3180"]("\x78l1\x732\x382");include ${"G\x4c\x4fB\x41L\x53"}["\x78\x6c1s2\x31"]["xl\x31s\x318\x30"]("\x78l1s\x33\x383");echo ${"G\x4c\x4f\x42\x41\x4cS"}["\x78l\x31s2\x31"]["xl\x31s1\x380"]("\x78l1s\x3484")."$xl3s2235".${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31s58\x35");

echo xl2s155($xl3s2235);$PFRJVx=${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x32\x31"]["xl1\x73180"]("x\x6c1\x7368\x38");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236".${"G\x4cO\x42A\x4c\x53"}["x\x6c1s2\x31"]["xl1\x73\x3180"]("x\x6c1\x737\x38\x39");
 function xl1s155(){echo ${"G\x4c\x4f\x42\x41\x4c\x53"}["xl\x31s21"]["\x78\x6c\x31\x73\x3180"]("xl\x31s8\x390");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){

$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=${"\x47\x4c\x4f\x42\x41L\x53"}["xl\x31\x732\x31"]["\x78l\x31\x73\x3180"]("xl\x31s9\x391")."$this->xl1s158".${"\x47\x4c\x4f\x42A\x4c\x53"}["xl\x31s\x32\x31"]["\x78l1\x73180"]("xl\x31s10\x392");

$this->xl1s161();$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x732\x31"]["x\x6c1s1\x380"]("xl1\x73\x311\x393");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235)
{$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x7321"]["x\x6c1s1\x380"]("xl1\x73\x31\x3294")."$xl1s6235".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31\x731\x38\x30"]("\x78l\x31s13\x395");}}}xl2s156($xl3s2237);

$xl1s7236=${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x78l1s\x321"]["xl\x31s\x3180"]("\x78l1\x7314\x397");$xl1s7237=new Lista($xl3s2240,${${"\x47L\x4fBA\x4cS"}["\x78\x6c\x31s21"]["xl\x31s\x3180"]("\x78l1s\x313\x396")});

$xl1s7239=new Lista($xl3s2240);
?>
<div>
<?php $xl1s7237->xlz11(); ?>

 </div> <div>
<?php echo ${"G\x4c\x4fB\x41\x4cS"}["\x78l\x31s21"]["xl1\x7318\x30"]("x\x6c1s1\x360\x30");

$xl1s7239->xlz11(); ?>
 </div>
<?php
xl2s156($xl3s2238);xl1s155();if( isset(${${"\x47LO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31\x73\x3181")}[${"G\x4cO\x42\x41L\x53"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c1\x73170\x32")]) ){if(!empty(${${"G\x4c\x4fBA\x4cS"}["xl\x31s21"]["\x78\x6c1s1\x380"]("xl\x31s\x3181")}[${"\x47\x4cO\x42A\x4cS"}["xl\x31\x73\x32\x31"]["\x78l\x31s18\x30"]("xl\x31s1\x380\x33")]))
{$xl1s10236=${${"G\x4cO\x42A\x4cS"}["xl\x31\x7321"]["\x78l1\x7318\x30"]("xl\x31s18\x31")}[${"\x47L\x4fB\x41\x4cS"}["xl1\x732\x31"]["x\x6c1s\x318\x30"]("xl1\x73190\x34")];echo ${"\x47L\x4f\x42\x41\x4cS"}["xl1\x7321"]["x\x6c1s1\x38\x30"]("xl1\x73\x32005")."$xl1s10236".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31s18\x30"]("\x78l\x31s2\x31\x306")
;}}echo ${"\x47\x4cO\x42A\x4cS"}["\x78l1s\x32\x31"]["xl\x31\x7318\x30"]("\x78l\x31s\x32207");

?>

Note: The php obfuscator installer files includes all sample files.