Myphpguard is now open source, licence LGPL.
myphpguard src.rar
myphpguard_src.zip
Free php obfuscator and encoder
Monday, August 3, 2015
Thursday, April 10, 2014
myphpguard 1.5 php obfuscator
myphpguard 1.5, new version available for free download.
New in this version:
- Improved generated code, for work with javascript and html.
- Added support for shell type comments.
- Fixed some issues deleting comments.
- Added support for more features of php code inside strings.
All these new improvements you can test in the demo
that comes with the installer or zip of the php obfuscator.
New in this version:
- Improved generated code, for work with javascript and html.
- Added support for shell type comments.
- Fixed some issues deleting comments.
- Added support for more features of php code inside strings.
All these new improvements you can test in the demo
that comes with the installer or zip of the php obfuscator.
Friday, March 14, 2014
Myphpguard 1.4 php obfuscator
New stable version available, myphpguard 1.4, free php obfuscator.
New features and fix some issues:
- Added support for interfaces.
- Added option to rename classes and interfaces.
- Added partial support for strings within eval-constructions.
- Fixed a problem with the encoding.
- Added option to set the encoding of the resulting code.
- We have implemented a new method to recognize
element names thus have fixed many errors.
Tuesday, November 13, 2012
MYPHPGUARD free php obfuscator UPDATE
There is a new release of Myphpguard. This is a good free php obfuscator and encoder.
This new version of obfuscator has few changes:
- There are no limits to the number of files in the project.
- Fixed some bugs when processing php files.
Also available is an installer for Windows.
INSTALLATION
For Windows 98/Me/XP and later:
- Download the installer.
- Double-click the installer file to run it.
- Download the zip with binary files, extract it to any folder.
- Execute the command mono EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator.
Myphpguard installer + portable 1.3.54d
http://www.mediafire.com/?2pnh2pjk87c9rhd
Myphpguard windows installer (.msi)
Myphpguard portable (.zip) for .net and mono
How to use the php obfuscator
Know issues
There are known issues when using this php obfuscator. 1)Static strings and advanced obfucation static $name="php name"; result not work static $x355=myfunc(); In this case disable "Use Advanced Obfuscation for String and varnames". 2)Varname Hiding and Superglobals within functions or class methods function Test() { echo $_POST['data']; } result: function x545(){ echo ${myfunc()}[myfunc()]; } Here ${myfunc()} don't work To solve this just uncheck "Enable var Names Hiding" 3)Variables ${'Name'} result: $ft45{myfunc()} don't work If anyone has any other problems with this obfuscator can report me. Meanwhile we will continue working to improve this program.
Thursday, April 12, 2012
Myphpguard a free php obfuscator and encoder v1.354
Description
Myphpguard is an obfuscator and encoder tool that will help you protect php code easily. It renames variables, functions, fields and methods. Hides and encode all strings and Superglobals($_GET,$_SERVER,...). MyPhpGuard process all files from selected project folder into a single step maintaining the consistency between dependent files(-requires and -includes).Main features include:
- You can save, open and create new projects using the File Menu or click the respective button from toolbar.
- This obfuscator renames variables, functions, methods from classes.
- Hides all strings and Superglobals, also variable names.(optional)
- Encode strings and variable names with base64.(optional)
- Delete all comments (Support only for c/c++ style comments).
- Include custom setting for particular variables, functions, fields and methods.
- You can select generate mapping files for obfuscated files and can reuse this mapping files for others projects.
- Do not support variable functions.
- If use string hiding with static strings, result code will not work.( static $var1="select";)
- Myphpguard is a multiplatform obfuscator-encoder, work on any OS with .Net Framework(2.0 or higher) or Mono 2.x (version 1.35 require Mono 2.8).
For Windows 98/Me/XP and later:
- Download the installer.
- Double-click the installer file to run it.
- Download the zip with binary files, extract it to any folder.
- Execute the command mono EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator.
Example
The following files show an example using the php obfuscator myphpguard 1.354: alltest.php,
exfuncs.php, exvars.php. The file alltest.php include references to variables
and functions from exvars.php and exfuncs, respectively.
Note: The php obfuscator installer files includes all sample files.
alltest.php
<?php include "exfuncs.php"; include "./exvars.php"; echo "<HTML><HEAD><TITLE>$title</TITLE></HEAD><BODY>"; echo getElementH2($title); //*** String Test //$cadena1="String Test"; $cadena2='Multiple Line: -$cadena1 -$cadena2'; $cadena3="\"$test1\" $cadena2"; addElementH3($test1); echo "$cadena3.</br>"; function AddTestForm() { echo '<form method="post" action="#" > <p>Texto:</p> <input id="Texto" type="text" style="width: 250px" name="Texto" /> <input id="subEnviar" type="submit" value="Send" name="subMsg" /> </form>'; } //*** Class Test /* * * * Class Lista */ class Lista { private $myList; private $cadena; private $style; public function Lista($uLista,$style="") { $this->myList=$uLista; $this->style=$style; } public function ShowLista() { if(!isset($this->myList) ) { return; } // $this->cadena="<ol style='$this->style' >"; $this->AddElements(); $this->cadena.="</ol>"; echo $this->cadena; } private function AddElements() { if(count($this->myList)>10) { return; } foreach ($this->myList as $item) { $this->cadena.="<li>$item</li>"; } } } addElementH3($test2); $style="color: #cccccc;"; $colorLista=new Lista($elementos,$style); $Lista=new Lista($elementos); ?> <div><?php $colorLista->ShowLista(); ?> </div> <div><?php echo "<hr>"; $Lista->ShowLista(); ?> </div> <?php //*** Form Test addElementH3($test3); AddTestForm(); if( isset($_POST["subMsg"]) ) { if(!empty($_POST["Texto"])) { $texto=$_POST["Texto"]; echo "<div style='border: 1px solid gray' > Texto:$texto </div>"; } } echo '</BODY></HTML>'; ?>
exvars.php
<?php $title="Myphpguard obfuscator - All test"; $test1="String Test"; $test2="Class Test"; $test3="Form Test"; $nroElementos=4; $elementos=array(1=>"item1",2=>"item2",3=>"<b>elemento</b>",9=>"item9"); /* function err() { return "sssdd"; } */ ?>
exfuncs.php
<?php function getElementH2($cadena) { return '<H2>'.$cadena.'</H2>'; } function addElementH3($cadena) { echo "<H3>$cadena</H3><hr>"; } ?>Now, show the obfuscated files generated for the php obfuscator Myphpguard 1.354.
Obfuscated alltest.php - Test A:
Advanced string obfuscation disabled.<?php include "\x65\x78\x66u\x6e\x63\x73.\x70\x68\x70";include "\x2e\x2f\x65x\x76\x61\x72s\x2e\x70\x68\x70";echo "\x3c\x48\x54M\x4c>\x3cH\x45\x41\x44><\x54\x49\x54L\x45>"."$xl3s2235"."\x3c\x2f\x54I\x54\x4c\x45>\x3c\x2f\x48\x45A\x44>\x3cB\x4f\x44\x59>"; echo xl2s155($xl3s2235); $PFRJVx="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32" ;$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236"."\x2e\x3c\x2fb\x72>"; function xl1s155(){ echo "\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e" ;}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ) {return;}$this->xl1s157="\x3c\x6f\x6c \x73\x74\x79l\x65\x3d\x27"."$this->xl1s158"."\x27\x20>";$this->xl1s161();$this->xl1s157.="\x3c\x2f\x6fl>";echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10) {return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.="\x3c\x6c\x69>"."$xl1s6235"."\x3c\x2f\x6ci>";}}}xl2s156($xl3s2237);$xl1s7236="\x63\x6f\x6co\x72\x3a\x20#\x63\x63\x63\x63c\x63\x3b";$xl1s7237=new Lista($xl3s2240,$xl1s7236); $xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo "\x3c\x68\x72>"; $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset(${"_\x50\x4f\x53T"}["\x73\x75\x62M\x73\x67"]) ){if(!empty(${"\x5fP\x4fS\x54"}["\x54\x65\x78t\x6f"])){$xl1s10236=${"_\x50O\x53T"}["\x54\x65\x78t\x6f"]; echo "\x3c\x64\x69v\x20\x73\x74y\x6c\x65\x3d\x27b\x6f\x72\x64e\x72\x3a\x201\x70\x78 \x73\x6f\x6c\x69\x64 \x67r\x61y\x27 > \x20 \x20 \x20 \x20\x54\x65\x78t\x6f:"."$xl1s10236"." \x20 \x20\x20\x20 \x20\x3c\x2f\x64i\x76>" ;}}echo "\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e"; ?>
Obfuscated alltest.php - Test B:
Advanced string obfuscation enabled, encode string disabled and variable names hiding disabled.<?php if(!function_exists("xl1s44")){class xl1s21 { static $xl1s202="\x65x\x66un\x63s.\x70h\x70"; static $xl1s225=".\x2fex\x76a\x72\x73.p\x68p"; static $xl1s248="\x3c\x48T\x4dL\x3e\x3c\x48EA\x44>\x3c\x54IT\x4cE\x3e"; static $xl1s271="<\x2fT\x49\x54L\x45><\x2f\x48E\x41D>\x3c\x42\x4f\x44\x59>"; static $xl1s294="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32"; static $xl1s317="\x2e</\x62r>"; static $xl1s340="\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e"; static $xl1s363="<o\x6c s\x74y\x6c\x65='"; static $xl1s386="\x27\x20\x3e"; static $xl1s409="</\x6fl\x3e"; static $xl1s432="\x3cli\x3e"; static $xl1s455="</\x6c\x69\x3e"; static $xl1s478="\x63o\x6cor\x3a\x20#c\x63\x63c\x63c\x3b"; static $xl1s501="<h\x72>"; static $xl1s524="s\x75\x62M\x73g"; static $xl1s547="Te\x78\x74\x6f"; static $xl1s570="T\x65x\x74o"; static $xl1s593="<d\x69v \x73t\x79\x6c\x65=\x27bo\x72de\x72: \x31px\x20\x73ol\x69d \x67r\x61y'\x20>\xd \x20\x20 \x20\x20 T\x65x\x74\x6f:"; static $xl1s616=" \xa\x20\x20 \x20 \x20 \x3c\x2fd\x69v>"; static $xl1s639="\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e"; }eval("e\x76\x61\x6c\x28b\x61s\x656\x34\x5f\x64e\x63o\x64e\x28\x27\x5anV\x75Y3R\x70b24\x67e\x47wx\x63\x7aQ\x30KCR\x34\x62\x44FzN\x6aUp\x49Hty\x5a\x58\x521c\x6d4ge\x47\x77xc\x7aIxO\x6aoke\x79R7\x49nh\x73X\x48gzM\x58Nc\x65DM\x32XHg\x7aNSJ\x39\x66Tt\x39\x27\x29\x29\x3b");} include xl1s44("x\x6c1s2\x302");include xl1s44("xl1\x73\x322\x35");echo xl1s44("x\x6c1\x73\x324\x38")."$xl3s2235".xl1s44("xl1\x73271");echo xl2s155($xl3s2235);$PFRJVx=xl1s44("x\x6c\x31s\x3294");$xl1s2236="\"$xl3s2236\" "."$PFRJVx"; xl2s156($xl3s2236);echo "$xl1s2236".xl1s44("xl1\x733\x31\x37"); function xl1s155(){echo xl1s44("x\x6c1s3\x340");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){ $this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=xl1s44("\x78\x6c\x31\x73\x33\x363")."$this->xl1s158".xl1s44("xl\x31s\x3386"); $this->xl1s161();$this->xl1s157.=xl1s44("\x78l1\x7340\x39");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.=xl1s44("xl\x31s43\x32")."$xl1s6235".xl1s44("\x78l\x31\x73455"); }}}xl2s156($xl3s2237);$xl1s7236=xl1s44("xl\x31s4\x378");$xl1s7237=new Lista($xl3s2240,$xl1s7236);$xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo xl1s44("\x78l1s\x350\x31"); $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset($_POST[xl1s44("xl\x31\x73\x3524")]) ){if(!empty($_POST[xl1s44("\x78l\x31s54\x37")])){$xl1s10236=$_POST[xl1s44("xl\x31s5\x370")];echo xl1s44("\x78\x6c\x31\x7359\x33")."$xl1s10236".xl1s44("xl1\x736\x316") ;}}echo xl1s44("x\x6c1s\x3639"); ?>
Obfuscated alltest.php - Test C:
Advanced string obfuscation enabled (array mode), encode string with base64 enabled and variable names hiding enabled.<?php if(!function_exists("xl1s47")){${"G\x4cO\x42A\x4c\x53"} ["xl\x31\x7321"]= array( "xl1s282"=>"ZXh\x6dd\x575\x6ac\x795wa\x48A\x3d", "xl1s180"=>"x\x6c1s\x37\x39", "xl1s383"=>"Li9\x6ceHZ\x68cn\x4ducG\x68w", "xl1s484"=>"PE\x68\x55T\x55\x77\x2bPEh\x46Q\x55Q+\x50F\x52JVE\x78FP\x67=\x3d", "xl1s178"=>"b\x61\x73e\x36\x34\x5fde\x63o\x64e", "xl1s585"=>"PC\x39USV\x52MRT\x348\x4c\x30hF\x51U\x51+P\x45JP\x52Fk\x2b", "xl1s179"=>"\x78\x6c1s\x347", "xl1s688"=>"TX\x56s\x64\x47lwb\x47UgT\x47l\x75Z\x54oN\x43i0k\x592\x46kZ\x575\x68MQ\x30\x4bLS\x52jYW\x52lb\x6dE\x79", "xl1s789"=>"\x4cjw\x76YnI\x2b", "xl1s890"=>"PG\x5avcm\x30gb\x57V\x30aG9\x6b\x50\x53Jw\x62\x33\x4e\x30IiB\x68\x59\x33Rpb\x32\x349I\x69Mi\x49\x444N\x43\x69Ag\x49CAg\x49C\x41g\x49\x44xw\x50\x6cR\x6ceHR\x76\x4fjw\x76cD\x34\x4e\x43i\x41gI\x43AgI\x43Ag\x49Dxp\x62n\x421dC\x42p\x5aD0i\x56G\x564\x64G8\x69I\x48R5c\x47U\x39In\x52l\x65\x48QiI\x48\x4e0eW\x78lPS\x4a\x33aWR\x30aDo\x67M\x6aUwc\x48\x67i\x49\x475\x68b\x57U9I\x6c\x52le\x48Rv\x49iA\x76Pg0\x4bI\x43A\x67I\x43\x41gIC\x41gPG\x6c\x75cH\x56\x30I\x47\x6ck\x50SJz\x64WJ\x46bn\x5a\x70\x59X\x49iI\x48\x525cG\x559\x49n\x4e1Y\x6d\x31pdC\x49\x67dmF\x73dWU\x39I\x6cN\x6cbmQ\x69IG5\x68b\x57U9\x49nN\x31Yk1\x7aZy\x49\x67\x4cz4\x4e\x43i\x41gI\x43\x41\x67\x49CAg\x49Dwv\x5am9\x79bT4\x3d", "xl1s991"=>"\x50G\x39s\x49HN\x30e\x57\x78lP\x53\x63\x3d", "xl1s1092"=>"Jy\x41+", "xl1s1193"=>"\x50C9v\x62D4\x3d", "xl1s1294"=>"PG\x78\x70P\x67\x3d=", "xl1s1395"=>"P\x439\x73\x61T\x34\x3d", "xl1s1497"=>"Y29\x73b3\x496IC\x4ejY\x32Nj\x592\x4d7", "xl1s1396"=>"eG\x77xc\x7acy\x4dz\x59=", "xl1s1600"=>"PGh\x79P\x67\x3d\x3d", "xl1s181"=>"X1\x42\x50\x55\x31Q\x3d", "xl1s1702"=>"c3V\x69TXN\x6e", "xl1s1803"=>"V\x47\x564\x64G8\x3d", "xl1s1904"=>"VGV\x34d\x47\x38=", "xl1s2005"=>"P\x47Rpd\x69Bz\x64\x48lsZ\x540n\x59m9y\x5a\x47Vy\x4f\x69Ax\x63\x48ggc\x329sa\x57\x51g\x5a3Jh\x65Sc\x67Pg\x30KI\x43AgI\x43AgI\x46\x52leH\x52vO\x67==", "xl1s2106"=>"DQo\x67\x49C\x41g\x49\x43A\x67P\x439k\x61XY+", "xl1s2207"=>"P\x439\x43\x540R\x5aPj\x77v\x53FRN\x54\x444=", "h1lI"=>"r1256");eval("\x65\x76a\x6c\x28b\x61\x73\x65\x36\x34_\x64e\x63\x6fd\x65\x28\x27Z\x6eV\x75Y\x33Rpb\x324g\x65\x47wxc\x7ac5\x4b\x43R\x34b\x44F\x7a\x4dTAw\x4bXsk\x65\x79J4b\x46x4\x4dzFc\x65D\x63zMT\x46ceD\x4dx\x49n09\x4aHsi\x520xc\x65DRm\x51k\x46\x4dXHg\x31M\x79J\x39\x57yJ4\x62F\x784M\x7aF\x7a\x4dlx4\x4dzE\x69\x58V\x73i\x65\x47\x78\x63\x65\x44M\x78c\x31x4\x4d\x7aE\x33XH\x67\x7aO\x43\x4adO\x33\x4aldH\x56\x79bi\x41ke\x79\x4a\x63eDc\x34b\x44\x46c\x65\x44czM\x56x4\x4dzEx\x49\x6e0\x6fJH\x73i\x58\x48g0N\x31x4\x4eGN\x50Ql\x78\x34ND\x46\x63\x65\x44R\x6aUyJ\x39WyJ\x63eD\x634bD\x46\x7a\x58H\x67z\x4djEi\x58\x56\x73\x6beyJ\x63eDc\x34bFx\x34\x4dzF\x7aXHg\x7aM\x54A\x77I\x6e1\x64KTt\x39\x27\x29\x29\x3b\x65v\x61l\x28b\x61\x73e\x364\x5f\x64e\x63\x6f\x64\x65\x28\x27Z\x6e\x56uY\x33\x52p\x622\x34ge\x47wx\x63zQ3\x4bCR\x34bD\x46\x7a\x4ejgp\x653Jl\x64HVy\x62i\x41k\x65yJH\x54E9c\x65DQy\x58H\x670\x4dUxT\x49n\x31bI\x6e\x68\x63eD\x5ajM\x58M\x79\x58Hg\x7aMSJ\x64Wy\x527In\x68s\x4d\x56x4N\x7a\x4d2O\x43\x4a9XT\x749\x27\x29\x29\x3b");} include ${"\x47\x4cO\x42A\x4cS"}["xl1\x7321"]["xl\x31s\x3180"]("\x78l1\x732\x382");include ${"G\x4c\x4fB\x41L\x53"}["\x78\x6c1s2\x31"]["xl\x31s\x318\x30"]("\x78l1s\x33\x383");echo ${"G\x4c\x4f\x42\x41\x4cS"}["\x78l\x31s2\x31"]["xl\x31s1\x380"]("\x78l1s\x3484")."$xl3s2235".${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31s58\x35"); echo xl2s155($xl3s2235);$PFRJVx=${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x32\x31"]["xl1\x73180"]("x\x6c1\x7368\x38");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236".${"G\x4cO\x42A\x4c\x53"}["x\x6c1s2\x31"]["xl1\x73\x3180"]("x\x6c1\x737\x38\x39"); function xl1s155(){echo ${"G\x4c\x4f\x42\x41\x4c\x53"}["xl\x31s21"]["\x78\x6c\x31\x73\x3180"]("xl\x31s8\x390");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function Lista($xl1s4235,$xl1s4236=""){ $this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=${"\x47\x4c\x4f\x42\x41L\x53"}["xl\x31\x732\x31"]["\x78l\x31\x73\x3180"]("xl\x31s9\x391")."$this->xl1s158".${"\x47\x4c\x4f\x42A\x4c\x53"}["xl\x31s\x32\x31"]["\x78l1\x73180"]("xl\x31s10\x392"); $this->xl1s161();$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x732\x31"]["x\x6c1s1\x380"]("xl1\x73\x311\x393");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235) {$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x7321"]["x\x6c1s1\x380"]("xl1\x73\x31\x3294")."$xl1s6235".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31\x731\x38\x30"]("\x78l\x31s13\x395");}}}xl2s156($xl3s2237); $xl1s7236=${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x78l1s\x321"]["xl\x31s\x3180"]("\x78l1\x7314\x397");$xl1s7237=new Lista($xl3s2240,${${"\x47L\x4fBA\x4cS"}["\x78\x6c\x31s21"]["xl\x31s\x3180"]("\x78l1s\x313\x396")}); $xl1s7239=new Lista($xl3s2240); ?> <div> <?php $xl1s7237->xlz11(); ?> </div> <div> <?php echo ${"G\x4c\x4fB\x41\x4cS"}["\x78l\x31s21"]["xl1\x7318\x30"]("x\x6c1s1\x360\x30"); $xl1s7239->xlz11(); ?> </div> <?php xl2s156($xl3s2238);xl1s155();if( isset(${${"\x47LO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31\x73\x3181")}[${"G\x4cO\x42\x41L\x53"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c1\x73170\x32")]) ){if(!empty(${${"G\x4c\x4fBA\x4cS"}["xl\x31s21"]["\x78\x6c1s1\x380"]("xl\x31s\x3181")}[${"\x47\x4cO\x42A\x4cS"}["xl\x31\x73\x32\x31"]["\x78l\x31s18\x30"]("xl\x31s1\x380\x33")])) {$xl1s10236=${${"G\x4cO\x42A\x4cS"}["xl\x31\x7321"]["\x78l1\x7318\x30"]("xl\x31s18\x31")}[${"\x47L\x4fB\x41\x4cS"}["xl1\x732\x31"]["x\x6c1s\x318\x30"]("xl1\x73190\x34")];echo ${"\x47L\x4f\x42\x41\x4cS"}["xl1\x7321"]["x\x6c1s1\x38\x30"]("xl1\x73\x32005")."$xl1s10236".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31s18\x30"]("\x78l\x31s2\x31\x306") ;}}echo ${"\x47\x4cO\x42A\x4cS"}["\x78l1s\x32\x31"]["xl\x31\x7318\x30"]("\x78l\x31s\x32207"); ?>
Subscribe to:
Comments (Atom)