shell bypass 403

Cubjrnet7 Shell

: /usr/include/gio-unix-2.0/gio/ [ drwxr-xr-x ]

 Info server
Uname: Linux server.eklavya.in 5.14.0-284.11.1.el9_2.x86_64 #1 SMP PREEMPT_DYNAMIC Tue May 9 05:49:00 EDT 2023 x86_64
Software: Apache
PHP version: 8.1.33 [ PHP INFO ] PHP os: Linux
Server Ip: 172.67.188.184
Your Ip: 216.73.216.21, 216.73.216.21
User: eklavya (1003) | Group: eklavya (1003)
Safe Mode: OFF
Disable Function:
exec,passthru,shell_exec,system

name last edit size owner:downer permission options
..
gdesktopappinfo.h 2021-08-19 22:27:25 8.48 KB root:root -rw-r--r--
gfiledescriptorbased.h 2021-08-19 22:27:25 2.17 KB root:root -rw-r--r--
gunixconnection.h 2021-08-19 22:27:25 5.63 KB root:root -rw-r--r--
gunixcredentialsmessage.h 2021-08-19 22:27:25 3.12 KB root:root -rw-r--r--
gunixfdlist.h 2021-08-19 22:27:25 4.15 KB root:root -rw-r--r--
gunixfdmessage.h 2021-08-19 22:27:25 3.68 KB root:root -rw-r--r--
gunixinputstream.h 2021-08-19 22:27:25 2.95 KB root:root -rw-r--r--
gunixmounts.h 2021-08-19 22:27:25 7.37 KB root:root -rw-r--r--
gunixoutputstream.h 2021-08-19 22:27:25 2.98 KB root:root -rw-r--r--
gunixsocketaddress.h 2021-08-19 22:27:25 3.34 KB root:root -rw-r--r--
© 2025 Cubjrnet7