Thursday, April 12, 2012

Myphpguard a free php obfuscator and encoder v1.354

Description

Myphpguard is an obfuscator and encoder tool that will help you protect php code easily. It renames variables, functions, fields and methods. Hides and encode all strings and Superglobals($_GET,$_SERVER,...). MyPhpGuard process all files from selected project folder into a single step maintaining the consistency between dependent files(-requires and -includes).


Main features include:
  1. You can save, open and create new projects using the File Menu or click the respective button from toolbar.
  2. This obfuscator renames variables, functions, methods from classes.
  3. Hides all strings and Superglobals, also variable names.(optional)
  4. Encode strings and variable names with base64.(optional)
  5. Delete all comments (Support only for c/c++ style comments).
  6. Include custom setting for particular variables, functions, fields and methods.
  7. You can select generate mapping files for obfuscated files and can reuse this mapping files for others projects.
  8. Do not support variable functions.
  9. If use string hiding with static strings, result code will not work.( static $var1="select";)
  10. Myphpguard is a multiplatform obfuscator-encoder, work on any OS with .Net Framework(2.0 or higher) or Mono 2.x (version 1.35 require Mono 2.8).
INSTALLATION
For Windows 98/Me/XP and later:
  1. Download the installer.
  2. Double-click the installer file to run it. 
For others platforms with Mono 2.8.x
  1. Download the zip with binary files, extract it to any folder.
  2. Execute the command  mono  EXTRACT_DIR/MyPhpGuard.exe to run the obfuscator. 
DOWNLOAD LINKS
  1. Php obfuscator and examples - link A
  2. Download free php obfuscator encoder and examples - link B

Example

The following files show an example using the php obfuscator myphpguard 1.354: alltest.php, exfuncs.php, exvars.php. The file alltest.php include references to variables and functions from exvars.php and exfuncs, respectively.

alltest.php


<?php
include "exfuncs.php";
include "./exvars.php";
echo "<HTML><HEAD><TITLE>$title</TITLE></HEAD><BODY>";

echo getElementH2($title);
//*** String Test
//$cadena1="String Test";
$cadena2='Multiple Line:
-$cadena1

-$cadena2';

$cadena3="\"$test1\" $cadena2";
addElementH3($test1);
echo "$cadena3.</br>";


function AddTestForm()
{
   echo '<form method="post" action="#" >
         <p>Texto:</p>
         <input id="Texto" type="text" style="width: 250px" name="Texto" />
         <input id="subEnviar" type="submit" value="Send" name="subMsg" />

         </form>';
}
//*** Class Test

/*
*
*
* Class Lista
*/

class Lista
{
    private $myList;
    private $cadena;
    private $style;

    public function Lista($uLista,$style="")
    {
        $this->myList=$uLista;
        $this->style=$style;
    }

    public function ShowLista()
    {
        if(!isset($this->myList) )
        {
           return;
        }
        //

        $this->cadena="<ol style='$this->style' >";
        $this->AddElements();
        $this->cadena.="</ol>";
        echo $this->cadena;
    }

    private function AddElements()
    {
         if(count($this->myList)>10)
         {
             return;
         }

         foreach ($this->myList as $item)
         {
            $this->cadena.="<li>$item</li>";
         }
    }

}
addElementH3($test2);

$style="color: #cccccc;";
$colorLista=new Lista($elementos,$style);
$Lista=new Lista($elementos);


?>
<div><?php $colorLista->ShowLista(); ?> </div> <div><?php echo "<hr>";

$Lista->ShowLista(); ?> </div>
<?php
//*** Form Test
addElementH3($test3);
AddTestForm();

if( isset($_POST["subMsg"]) )
{
   if(!empty($_POST["Texto"]))
   {
       $texto=$_POST["Texto"];
       echo "<div style='border: 1px solid gray' >

       Texto:$texto
       </div>";
   }

}

echo '</BODY></HTML>';
?>

exvars.php

<?php

$title="Myphpguard obfuscator - All test";
$test1="String Test";

$test2="Class Test";
$test3="Form Test";

$nroElementos=4;

$elementos=array(1=>"item1",2=>"item2",3=>"<b>elemento</b>",9=>"item9");


/*
function err()
{
   return "sssdd";
}
*/
?>

exfuncs.php

<?php

function getElementH2($cadena)
{
   return '<H2>'.$cadena.'</H2>';
}


function addElementH3($cadena)
{
   echo "<H3>$cadena</H3><hr>";
}

?>
Now, show the obfuscated files generated for the php obfuscator Myphpguard 1.354.

Obfuscated alltest.php - Test A:

Advanced string obfuscation disabled.
<?php

include "\x65\x78\x66u\x6e\x63\x73.\x70\x68\x70";include "\x2e\x2f\x65x\x76\x61\x72s\x2e\x70\x68\x70";echo "\x3c\x48\x54M\x4c>\x3cH\x45\x41\x44><\x54\x49\x54L\x45>"."$xl3s2235"."\x3c\x2f\x54I\x54\x4c\x45>\x3c\x2f\x48\x45A\x44>\x3cB\x4f\x44\x59>";

echo xl2s155($xl3s2235);
$PFRJVx="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32"
;$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236"."\x2e\x3c\x2fb\x72>"; function xl1s155(){

echo "\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e"
;}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) )
{return;}$this->xl1s157="\x3c\x6f\x6c \x73\x74\x79l\x65\x3d\x27"."$this->xl1s158"."\x27\x20>";$this->xl1s161();$this->xl1s157.="\x3c\x2f\x6fl>";echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10)
{return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.="\x3c\x6c\x69>"."$xl1s6235"."\x3c\x2f\x6ci>";}}}xl2s156($xl3s2237);$xl1s7236="\x63\x6f\x6co\x72\x3a\x20#\x63\x63\x63\x63c\x63\x3b";$xl1s7237=new Lista($xl3s2240,$xl1s7236);

$xl1s7239=new Lista($xl3s2240);
?>
<div>
<?php $xl1s7237->xlz11(); ?>

 </div> <div>
<?php echo "\x3c\x68\x72>";
$xl1s7239->xlz11(); ?>

 </div>
<?php
xl2s156($xl3s2238);xl1s155();if( isset(${"_\x50\x4f\x53T"}["\x73\x75\x62M\x73\x67"]) ){if(!empty(${"\x5fP\x4fS\x54"}["\x54\x65\x78t\x6f"])){$xl1s10236=${"_\x50O\x53T"}["\x54\x65\x78t\x6f"];

echo "\x3c\x64\x69v\x20\x73\x74y\x6c\x65\x3d\x27b\x6f\x72\x64e\x72\x3a\x201\x70\x78 \x73\x6f\x6c\x69\x64 \x67r\x61y\x27 >
\x20 \x20 \x20 \x20\x54\x65\x78t\x6f:"."$xl1s10236"."
\x20 \x20\x20\x20 \x20\x3c\x2f\x64i\x76>"
;}}echo "\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e";

?>

Obfuscated alltest.php - Test B:

Advanced string obfuscation enabled, encode string disabled and variable names hiding disabled.
<?php if(!function_exists("xl1s44")){class xl1s21 { static $xl1s202="\x65x\x66un\x63s.\x70h\x70"; static $xl1s225=".\x2fex\x76a\x72\x73.p\x68p"; static $xl1s248="\x3c\x48T\x4dL\x3e\x3c\x48EA\x44>\x3c\x54IT\x4cE\x3e"; static $xl1s271="<\x2fT\x49\x54L\x45><\x2f\x48E\x41D>\x3c\x42\x4f\x44\x59>"; static $xl1s294="\x4d\x75\x6c\x74\x69\x70\x6c\x65\x20\x4c\x69\x6e\x65\x3a\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x31\xd\xa\x2d\x24\x63\x61\x64\x65\x6e\x61\x32";

static $xl1s317="\x2e</\x62r>"; static $xl1s340="\x3c\x66\x6f\x72\x6d\x20\x6d\x65\x74\x68\x6f\x64\x3d\x22\x70\x6f\x73\x74\x22\x20\x61\x63\x74\x69\x6f\x6e\x3d\x22\x23\x22\x20\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x70\x3e\x54\x65\x78\x74\x6f\x3a\x3c\x2f\x70\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x74\x79\x70\x65\x3d\x22\x74\x65\x78\x74\x22\x20\x73\x74\x79\x6c\x65\x3d\x22\x77\x69\x64\x74\x68\x3a\x20\x32\x35\x30\x70\x78\x22\x20\x6e\x61\x6d\x65\x3d\x22\x54\x65\x78\x74\x6f\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x69\x6e\x70\x75\x74\x20\x69\x64\x3d\x22\x73\x75\x62\x45\x6e\x76\x69\x61\x72\x22\x20\x74\x79\x70\x65\x3d\x22\x73\x75\x62\x6d\x69\x74\x22\x20\x76\x61\x6c\x75\x65\x3d\x22\x53\x65\x6e\x64\x22\x20\x6e\x61\x6d\x65\x3d\x22\x73\x75\x62\x4d\x73\x67\x22\x20\x2f\x3e\xd\xa\x20\x20\x20\x20\x20\x20\x20\x20\x20\x3c\x2f\x66\x6f\x72\x6d\x3e";
static $xl1s363="<o\x6c s\x74y\x6c\x65='"; static $xl1s386="\x27\x20\x3e"; static $xl1s409="</\x6fl\x3e"; static $xl1s432="\x3cli\x3e"; static $xl1s455="</\x6c\x69\x3e"; static $xl1s478="\x63o\x6cor\x3a\x20#c\x63\x63c\x63c\x3b"; static $xl1s501="<h\x72>"; static $xl1s524="s\x75\x62M\x73g"; static $xl1s547="Te\x78\x74\x6f";

static $xl1s570="T\x65x\x74o"; static $xl1s593="<d\x69v \x73t\x79\x6c\x65=\x27bo\x72de\x72: \x31px\x20\x73ol\x69d \x67r\x61y'\x20>\xd
 \x20\x20 \x20\x20 T\x65x\x74\x6f:"; static $xl1s616="

\xa\x20\x20 \x20 \x20 \x3c\x2fd\x69v>"; static $xl1s639="\x3c\x2f\x42\x4f\x44\x59\x3e\x3c\x2f\x48\x54\x4d\x4c\x3e";
}eval("e\x76\x61\x6c\x28b\x61s\x656\x34\x5f\x64e\x63o\x64e\x28\x27\x5anV\x75Y3R\x70b24\x67e\x47wx\x63\x7aQ\x30KCR\x34\x62\x44FzN\x6aUp\x49Hty\x5a\x58\x521c\x6d4ge\x47\x77xc\x7aIxO\x6aoke\x79R7\x49nh\x73X\x48gzM\x58Nc\x65DM\x32XHg\x7aNSJ\x39\x66Tt\x39\x27\x29\x29\x3b");}
include xl1s44("x\x6c1s2\x302");include xl1s44("xl1\x73\x322\x35");echo xl1s44("x\x6c1\x73\x324\x38")."$xl3s2235".xl1s44("xl1\x73271");echo xl2s155($xl3s2235);$PFRJVx=xl1s44("x\x6c\x31s\x3294");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";
xl2s156($xl3s2236);echo "$xl1s2236".xl1s44("xl1\x733\x31\x37"); function xl1s155(){echo xl1s44("x\x6c1s3\x340");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){

$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=xl1s44("\x78\x6c\x31\x73\x33\x363")."$this->xl1s158".xl1s44("xl\x31s\x3386");

$this->xl1s161();$this->xl1s157.=xl1s44("\x78l1\x7340\x39");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235){$this->xl1s157.=xl1s44("xl\x31s43\x32")."$xl1s6235".xl1s44("\x78l\x31\x73455");
}}}xl2s156($xl3s2237);$xl1s7236=xl1s44("xl\x31s4\x378");$xl1s7237=new Lista($xl3s2240,$xl1s7236);$xl1s7239=new Lista($xl3s2240);

?>
<div>
<?php $xl1s7237->xlz11(); ?>
 </div> <div>

<?php echo xl1s44("\x78l1s\x350\x31");
$xl1s7239->xlz11(); ?>
 </div>
<?php

xl2s156($xl3s2238);xl1s155();if( isset($_POST[xl1s44("xl\x31\x73\x3524")]) ){if(!empty($_POST[xl1s44("\x78l\x31s54\x37")])){$xl1s10236=$_POST[xl1s44("xl\x31s5\x370")];echo xl1s44("\x78\x6c\x31\x7359\x33")."$xl1s10236".xl1s44("xl1\x736\x316")
;}}echo xl1s44("x\x6c1s\x3639");

?>

Obfuscated alltest.php - Test C:

Advanced string obfuscation enabled (array mode), encode string with base64 enabled and variable names hiding enabled.
<?php if(!function_exists("xl1s47")){${"G\x4cO\x42A\x4c\x53"} ["xl\x31\x7321"]= array( "xl1s282"=>"ZXh\x6dd\x575\x6ac\x795wa\x48A\x3d", "xl1s180"=>"x\x6c1s\x37\x39", "xl1s383"=>"Li9\x6ceHZ\x68cn\x4ducG\x68w", "xl1s484"=>"PE\x68\x55T\x55\x77\x2bPEh\x46Q\x55Q+\x50F\x52JVE\x78FP\x67=\x3d", "xl1s178"=>"b\x61\x73e\x36\x34\x5fde\x63o\x64e", "xl1s585"=>"PC\x39USV\x52MRT\x348\x4c\x30hF\x51U\x51+P\x45JP\x52Fk\x2b",

"xl1s179"=>"\x78\x6c1s\x347", "xl1s688"=>"TX\x56s\x64\x47lwb\x47UgT\x47l\x75Z\x54oN\x43i0k\x592\x46kZ\x575\x68MQ\x30\x4bLS\x52jYW\x52lb\x6dE\x79", "xl1s789"=>"\x4cjw\x76YnI\x2b", "xl1s890"=>"PG\x5avcm\x30gb\x57V\x30aG9\x6b\x50\x53Jw\x62\x33\x4e\x30IiB\x68\x59\x33Rpb\x32\x349I\x69Mi\x49\x444N\x43\x69Ag\x49CAg\x49C\x41g\x49\x44xw\x50\x6cR\x6ceHR\x76\x4fjw\x76cD\x34\x4e\x43i\x41gI\x43AgI\x43Ag\x49Dxp\x62n\x421dC\x42p\x5aD0i\x56G\x564\x64G8\x69I\x48R5c\x47U\x39In\x52l\x65\x48QiI\x48\x4e0eW\x78lPS\x4a\x33aWR\x30aDo\x67M\x6aUwc\x48\x67i\x49\x475\x68b\x57U9I\x6c\x52le\x48Rv\x49iA\x76Pg0\x4bI\x43A\x67I\x43\x41gIC\x41gPG\x6c\x75cH\x56\x30I\x47\x6ck\x50SJz\x64WJ\x46bn\x5a\x70\x59X\x49iI\x48\x525cG\x559\x49n\x4e1Y\x6d\x31pdC\x49\x67dmF\x73dWU\x39I\x6cN\x6cbmQ\x69IG5\x68b\x57U9\x49nN\x31Yk1\x7aZy\x49\x67\x4cz4\x4e\x43i\x41gI\x43\x41\x67\x49CAg\x49Dwv\x5am9\x79bT4\x3d",
"xl1s991"=>"\x50G\x39s\x49HN\x30e\x57\x78lP\x53\x63\x3d", "xl1s1092"=>"Jy\x41+", "xl1s1193"=>"\x50C9v\x62D4\x3d", "xl1s1294"=>"PG\x78\x70P\x67\x3d=", "xl1s1395"=>"P\x439\x73\x61T\x34\x3d", "xl1s1497"=>"Y29\x73b3\x496IC\x4ejY\x32Nj\x592\x4d7", "xl1s1396"=>"eG\x77xc\x7acy\x4dz\x59=", "xl1s1600"=>"PGh\x79P\x67\x3d\x3d",

"xl1s181"=>"X1\x42\x50\x55\x31Q\x3d", "xl1s1702"=>"c3V\x69TXN\x6e", "xl1s1803"=>"V\x47\x564\x64G8\x3d", "xl1s1904"=>"VGV\x34d\x47\x38=", "xl1s2005"=>"P\x47Rpd\x69Bz\x64\x48lsZ\x540n\x59m9y\x5a\x47Vy\x4f\x69Ax\x63\x48ggc\x329sa\x57\x51g\x5a3Jh\x65Sc\x67Pg\x30KI\x43AgI\x43AgI\x46\x52leH\x52vO\x67==", "xl1s2106"=>"DQo\x67\x49C\x41g\x49\x43A\x67P\x439k\x61XY+",

"xl1s2207"=>"P\x439\x43\x540R\x5aPj\x77v\x53FRN\x54\x444=",  "h1lI"=>"r1256");eval("\x65\x76a\x6c\x28b\x61\x73\x65\x36\x34_\x64e\x63\x6fd\x65\x28\x27Z\x6eV\x75Y\x33Rpb\x324g\x65\x47wxc\x7ac5\x4b\x43R\x34b\x44F\x7a\x4dTAw\x4bXsk\x65\x79J4b\x46x4\x4dzFc\x65D\x63zMT\x46ceD\x4dx\x49n09\x4aHsi\x520xc\x65DRm\x51k\x46\x4dXHg\x31M\x79J\x39\x57yJ4\x62F\x784M\x7aF\x7a\x4dlx4\x4dzE\x69\x58V\x73i\x65\x47\x78\x63\x65\x44M\x78c\x31x4\x4d\x7aE\x33XH\x67\x7aO\x43\x4adO\x33\x4aldH\x56\x79bi\x41ke\x79\x4a\x63eDc\x34b\x44\x46c\x65\x44czM\x56x4\x4dzEx\x49\x6e0\x6fJH\x73i\x58\x48g0N\x31x4\x4eGN\x50Ql\x78\x34ND\x46\x63\x65\x44R\x6aUyJ\x39WyJ\x63eD\x634bD\x46\x7a\x58H\x67z\x4djEi\x58\x56\x73\x6beyJ\x63eDc\x34bFx\x34\x4dzF\x7aXHg\x7aM\x54A\x77I\x6e1\x64KTt\x39\x27\x29\x29\x3b\x65v\x61l\x28b\x61\x73e\x364\x5f\x64e\x63\x6f\x64\x65\x28\x27Z\x6e\x56uY\x33\x52p\x622\x34ge\x47wx\x63zQ3\x4bCR\x34bD\x46\x7a\x4ejgp\x653Jl\x64HVy\x62i\x41k\x65yJH\x54E9c\x65DQy\x58H\x670\x4dUxT\x49n\x31bI\x6e\x68\x63eD\x5ajM\x58M\x79\x58Hg\x7aMSJ\x64Wy\x527In\x68s\x4d\x56x4N\x7a\x4d2O\x43\x4a9XT\x749\x27\x29\x29\x3b");}
include ${"\x47\x4cO\x42A\x4cS"}["xl1\x7321"]["xl\x31s\x3180"]("\x78l1\x732\x382");include ${"G\x4c\x4fB\x41L\x53"}["\x78\x6c1s2\x31"]["xl\x31s\x318\x30"]("\x78l1s\x33\x383");echo ${"G\x4c\x4f\x42\x41\x4cS"}["\x78l\x31s2\x31"]["xl\x31s1\x380"]("\x78l1s\x3484")."$xl3s2235".${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31s58\x35");

echo xl2s155($xl3s2235);$PFRJVx=${"G\x4cO\x42\x41\x4cS"}["x\x6c1s\x32\x31"]["xl1\x73180"]("x\x6c1\x7368\x38");$xl1s2236="\"$xl3s2236\" "."$PFRJVx";xl2s156($xl3s2236);echo "$xl1s2236".${"G\x4cO\x42A\x4c\x53"}["x\x6c1s2\x31"]["xl1\x73\x3180"]("x\x6c1\x737\x38\x39");
 function xl1s155(){echo ${"G\x4c\x4f\x42\x41\x4c\x53"}["xl\x31s21"]["\x78\x6c\x31\x73\x3180"]("xl\x31s8\x390");}class Lista{private $xl1s156;private $xl1s157;private $xl1s158;public function  Lista($xl1s4235,$xl1s4236=""){

$this->xl1s156=$xl1s4235;$this->xl1s158=$xl1s4236;}public function xlz11(){if(!isset($this->xl1s156) ){return;}$this->xl1s157=${"\x47\x4c\x4f\x42\x41L\x53"}["xl\x31\x732\x31"]["\x78l\x31\x73\x3180"]("xl\x31s9\x391")."$this->xl1s158".${"\x47\x4c\x4f\x42A\x4c\x53"}["xl\x31s\x32\x31"]["\x78l1\x73180"]("xl\x31s10\x392");

$this->xl1s161();$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x732\x31"]["x\x6c1s1\x380"]("xl1\x73\x311\x393");echo $this->xl1s157;}private function xl1s161(){if(count($this->xl1s156)>10){return;}foreach ($this->xl1s156 as $xl1s6235)
{$this->xl1s157.=${"\x47L\x4fB\x41L\x53"}["xl1\x7321"]["x\x6c1s1\x380"]("xl1\x73\x31\x3294")."$xl1s6235".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31\x731\x38\x30"]("\x78l\x31s13\x395");}}}xl2s156($xl3s2237);

$xl1s7236=${"\x47\x4c\x4f\x42\x41\x4c\x53"}["\x78l1s\x321"]["xl\x31s\x3180"]("\x78l1\x7314\x397");$xl1s7237=new Lista($xl3s2240,${${"\x47L\x4fBA\x4cS"}["\x78\x6c\x31s21"]["xl\x31s\x3180"]("\x78l1s\x313\x396")});

$xl1s7239=new Lista($xl3s2240);
?>
<div>
<?php $xl1s7237->xlz11(); ?>

 </div> <div>
<?php echo ${"G\x4c\x4fB\x41\x4cS"}["\x78l\x31s21"]["xl1\x7318\x30"]("x\x6c1s1\x360\x30");

$xl1s7239->xlz11(); ?>
 </div>
<?php
xl2s156($xl3s2238);xl1s155();if( isset(${${"\x47LO\x42\x41\x4cS"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c\x31\x73\x3181")}[${"G\x4cO\x42\x41L\x53"}["x\x6c1s\x321"]["xl1\x73180"]("x\x6c1\x73170\x32")]) ){if(!empty(${${"G\x4c\x4fBA\x4cS"}["xl\x31s21"]["\x78\x6c1s1\x380"]("xl\x31s\x3181")}[${"\x47\x4cO\x42A\x4cS"}["xl\x31\x73\x32\x31"]["\x78l\x31s18\x30"]("xl\x31s1\x380\x33")]))
{$xl1s10236=${${"G\x4cO\x42A\x4cS"}["xl\x31\x7321"]["\x78l1\x7318\x30"]("xl\x31s18\x31")}[${"\x47L\x4fB\x41\x4cS"}["xl1\x732\x31"]["x\x6c1s\x318\x30"]("xl1\x73190\x34")];echo ${"\x47L\x4f\x42\x41\x4cS"}["xl1\x7321"]["x\x6c1s1\x38\x30"]("xl1\x73\x32005")."$xl1s10236".${"\x47L\x4f\x42A\x4c\x53"}["xl1\x7321"]["x\x6c\x31s18\x30"]("\x78l\x31s2\x31\x306")
;}}echo ${"\x47\x4cO\x42A\x4cS"}["\x78l1s\x32\x31"]["xl\x31\x7318\x30"]("\x78l\x31s\x32207");

?>

Note: The php obfuscator installer files includes all sample files.