shell bypass 403

GrazzMean Shell

: /home/workvvfb/.trash/2020/09/ [ drwxr-xr-x ]
Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : samsung-32x32.jpg
���JFIF��ExifII*��,http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c148 79.164036, 2019/08/13-01:06:57        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop 21.0 (Windows)" xmpMM:InstanceID="xmp.iid:5A2EA25BF3A611EAB575E70D7AEB9ABF" xmpMM:DocumentID="xmp.did:5A2EA25CF3A611EAB575E70D7AEB9ABF"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:5A2EA259F3A611EAB575E70D7AEB9ABF" stRef:documentID="xmp.did:5A2EA25AF3A611EAB575E70D7AEB9ABF"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��  ����4!"1AQ��2�#4CRabc�������)!12QA���q�����?�iy����g4]v�]_�u8j��E�
���M4~��R��)h|�_,=pd��ؠ<��nۊ��`�'N�$)~��K+V�'�b����I��nccS�T7�%���Xޙ-�����j/o���'�z�'��;���B4q}}�|�씂8ռӇ�k�M�����̔t�[�7iΕ��F��
F�;o���CRz�z`W���Q5lܞ�쬙Y�e�Ο.J_N�!II<�
|Cm��Ǒ@��/{m�>��5�Z/�È��5����i�T� u	O6�k�<qo���j��h���V�Rv� Z�YG�	.�Ljk��\�R	:
��\�P��y�ZzI`9���݅��e���p4�
��J��{��N�R��X�oIJ� ���e��M�0�D�q	Z�Y �
��'~�p��QI��ɽ��{��3�g�i]L�/H�����e��%�
	$��NU���w�{ͨDzp�Fn���q��Rq�9���hڿ�;&�PT�;�������)��8꧉%}W8uQ�Z�1Zw�T�Kb*7&Im�{)fV#4��l!#�I7�I��
© 2025 GrazzMean