I analyzed the knowledge points used in the decryption process of Alibaba Cloud security two days ago. I sorted out the tools last night and encrypted them by the way. This is what we said yesterday. Let's take a look at the call method.
I analyzed the knowledge points used in the decryption process of Alibaba Cloud security two days ago. I sorted out the tools last night and encrypted them by the way. This is what we said yesterday. Let's take a look at the call method.
Download the decryption tool of php shield.
Decompress the package to a folder and put the file you want to decrypt.
Create a new decode. php code to write:
The Code is as follows:
Require ('cryption. php ');
Decryption ('Code. php ');
?>
After the code is executed, the source code file of Code_source.php is generated.
Effect
I have not found any problems at present. If you have any questions, I will handle them in time.
Do not make any changes to the decryption. php file. Otherwise, the file cannot be executed,
Decryption. php output format is UTF-8, so you 'd better use UTF-8 for your page.
This tool cannot decrypt itself. I did the verification. In fact, it is just to prevent unauthorized acquisition. If you want to decrypt the tool, do not issue the source code. It is really meaningless.