Find out what real code a php eval(gzinflate(base64_decode contains
When you are dealing with a hacked or otherwise compromised website where someone has installed a backdoor or other kinds of malicious code you will often find php files with code packed into non-readable format using php eval, like eval(gzinflate(base64_decode
.
To find out what the code does, copy the entire eval code (including “eval(“) into this site: http://ddecode.com/phpdecoder/
You will in the end get a human readable version of the code. Usually nasty stuff.