shell bypass 403

GrazzMean Shell

Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : pvp-station-32x32.jpg
���JFIF��ExifII*��/http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:DocumentID="xmp.did:558CC13E0AF611ECA145B158520BBE40" xmpMM:InstanceID="xmp.iid:558CC13D0AF611ECA145B158520BBE40" xmp:CreatorTool="Adobe Photoshop CC 2019 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:3C3B8AA3FA9A11EB871C8D57B8C4275C" stRef:documentID="xmp.did:3C3B8AA4FA9A11EB871C8D57B8C4275C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��  ����(!1q"2QaA����'!1A"2B��aq���?�A5h���7�20x�#O���e�R�J(�B-�M��ʽ��'�%�	�#GY�~��x<~�u'̨i�M��M��z�D��Q&rUD�RLy#��|��%�1>J�*�����rn�Wke�܍ 
#J���'��i���Y%{�~�%]xH�����iR�*Jg�d>쁬Z�.�Y�7is*)V���\&���VTZ��j7H������k�e�oQM�=�3ŋdA��71���jo�ƊV�� 1�S�3���`8T�>n��ܖ����?ه.�^�eƦ�^*�UD���{���ns�?���k��{>:}�Ȭ56���zxb���4vNT��W�]�ӎtY��e<FA�	Pҡ�S@���iP���B��i�?��
© 2025 GrazzMean