Wanderer Easy Payment Crack

Recently, I was bored and decided to browse a certain resource website. I saw an article about the source code of a payment system called "Langzi Easy Pay". I think I've heard of this Langzi Easy Pay before, and I remember it had a bad reputation. The article was posted by the author, and when I looked at the comments below, I laughed.


So I became interested and downloaded the source code to take a look.

I glanced at the code and there were only two files. I randomly opened one to see its structure.

eval($AWrjGM("encrypted code content"));?>

It seems that the author has some misunderstanding about encryption, or maybe overestimates their own skills. This is not much different from not encrypting it at all.

Cracking Method
This method usually involves hooking the eval function at the lower level to obtain the source code. The approach taken here is to change eval to file_put_contents because it's simpler.

The author used multiple layers of encryption, but it's not technically challenging to decrypt them one by one. After decryption, the authorization code is in the first line of the encrypted file.

	$query = curl_get("http://hidden_authorization_url/check.php?url=".$_SERVER["HTTP_HOST"]."&authcode=".authcode);
    if ($query = json_decode($query, true)) {
		if ($query["code"] == 1) {
			$_SESSION["authcode"] = authcode;
			sysmsg("<h3>".$query["msg"]."</h3>", true);

Just delete it or modify the curl_get function in /includes/functions.php to directly return {"code":1} when the parameter contains the authorization URL.

To be honest, there is not much difference between this version of Easy Pay and the original version, but the authorization fee for this one is at least 58 yuan per year...

Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.