shell bypass 403
��� JFIF �� Ducky d �� Exif II* ��http://ns.adobe.com/xap/1.0/ <?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xmp.did:471ec164-e0f3-df46-a5a9-28d466ec4f11" xmpMM:DocumentID="xmp.did:40DF16FE785A11EC8B35970B29CBCD88" xmpMM:InstanceID="xmp.iid:40DF16FD785A11EC8B35970B29CBCD88" xmp:CreatorTool="Adobe Photoshop CC 2019 (Windows)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:14d6b153-cdc7-734f-a50d-fb0fefcba021" stRef:documentID="xmp.did:471ec164-e0f3-df46-a5a9-28d466ec4f11"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>�� C
!'"#%%%),($+!$%$�� C $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$�� �t �� �� U !1AQ"a2q���#B�Rb��3Sr���$�����4CDcst�%����5ETd���� �� 2 !1AQ"a#q����B���2�Rb�� ? �E�5� �h1cB ar ��"���an� �����v���v��
��v�P�x-�� 7�X
bw� b{��m��n fU+�0�S�*��{�@+Xه=aLx�h����Xh=�� �s{B�+a2�� �4�:�]�˽�U�}�0b���!1-p!T��)In���) >��OaF�E�nD �q���(n
�dc���կ��Q�^� ᙍ��2��nL+�Q)�[�r '� X�KB`.:@��5�ـ J��Xn>�AQYz�@�Z����A���� ��(6��0p��6��v���;j��h �Pyd�����Bۘ���{B�J~^�N���HKP a�7�z���` ��SVǓ���l�
���T ]Ll�UTl?� ��U�a.O;��#�u\�@�6���w�w�v)���%6r.�$��� 4 o����jhms�!E@f%�t��G{��T��&��-D���w�
�ӣ�7�#(R��c���+{B:��Y���h[����K|��X
��0S�bWIA�0Qt*���x(��c~���Rͱ��t�@����k��0�,�n:^k0u��wF�҉S&�y�.��<s]>m�E� �l�I���y��Ǽ��4�W�! �]�&�Sq�� 9K���� nN�@m�E�"