# Decode print("🔓 Decoding process:") decoded_result = encoder.decode_payload(encoded)
def _generate_magic_header(self) -> str: """Generate a fake ionCube-style magic header""" timestamp = int(datetime.now().timestamp()) checksum = hashlib.md5(f"{self.key}{timestamp}".encode()).hexdigest()[:16] return f"IONCUBE_MAGIC_{timestamp}_{checksum}"
def _xor_unobfuscate(self, text: str) -> str: """Reverse XOR obfuscation""" try: decoded_bytes = base64.b64decode(text) except: decoded_bytes = text.encode() result = [] key_bytes = self.key.encode() for i, byte in enumerate(decoded_bytes): result.append(byte ^ key_bytes[i % len(key_bytes)]) return bytes(result).decode() ioncube decoder python
class IONCubeStyleDecoder: """ Demonstrates encoding techniques similar to those used in ionCube Shows layered encoding, obfuscation, and decoding patterns """
# Analyze encoding print("\n" + "=" * 60) print("Code Structure Analysis") print("=" * 60) text: str) ->
def decode_payload(self, encoded_data: str) -> Dict[str, Any]: """ Decode the layered payload and report each step """ result = { "success": False, "decoded": None, "steps": [], "magic_valid": False } try: # Extract and verify magic header magic = encoded_data[:32] result["magic_valid"] = self._verify_magic_header(magic) encoded_data = encoded_data[32:] # Reverse the encoding layers current = encoded_data # Step 1: Decompress try: current = zlib.decompress(base64.b64decode(current)).decode() result["steps"].append("decompressed") except: pass # Step 2: Reverse XOR try: current = self._xor_obfuscate(current) result["steps"].append("xor_undone") except: pass # Step 3: Base64 decode try: current = base64.b64decode(current).decode() result["steps"].append("base64_decoded") except: pass # Try to fully decode if multiple layers remain while self._is_likely_encoded(current): try: current = base64.b64decode(current).decode() result["steps"].append("additional_base64") except: break result["success"] = True result["decoded"] = current except Exception as e: result["error"] = str(e) return result
# Encode print("🔒 Encoding with multiple layers...") encoded = encoder.encode_payload(original_code, layers=3) print(f"Encoded result (first 100 chars):\n{encoded[:100]}...\n") encoded_data: str) ->
def _is_likely_encoded(self, text: str) -> bool: """Check if text looks like it's still encoded""" # Check if it looks like base64 import re base64_pattern = re.compile(r'^[A-Za-z0-9+/]+=*$') return bool(base64_pattern.match(text)) and len(text) > 32 class PHPCodeSimulator: """ Simulates PHP code encoding/decoding similar to ionCube Shows how PHP code can be encoded and restored """
# Run demo demo_ioncube_style_encoding()
def _verify_magic_header(self, magic: str) -> bool: """Verify the magic header format""" return magic.startswith("IONCUBE_MAGIC_") and len(magic) == 32
""" IONCube-Style Decoder Demonstrator Educational tool showing encoding/decoding patterns similar to ionCube NOT for actual ionCube decoding - purely for learning encoding concepts """ import base64 import zlib import hashlib import json from datetime import datetime from typing import Dict, Any, Optional import struct