in reply to Old Script with an Issue Due to Img Tag Use

Another option to decode might be overload::eval, that has a couple of reported bugs and test failures, but it's probably still worth a try:

$ perl -Moverload::eval=-p obfuscated.pl

Replies are listed 'Best First'.
Re^2: Old Script with an Issue Due to Img Tag Use
by pme (Monsignor) on Feb 01, 2015 at 16:09 UTC
    Hi AM,

    overload::eval is 'Hooks the native string eval() function' is according to its description. It is not for decoding.

      Yes and no, it doesn't decode directly - but many obfuscated scripts work by decoding a string that contains some code (like in the OP's example), and then evaling that string. So hooking eval to print the code instead of running it actually does decode such scripts. For example, scroll down to the bottom of that forum thread you linked to earlier. I'm not sure if the OP's script uses eval, but it seems like a good guess.