shell bypass 403

GrazzMean-Shell Shell

Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 3.149.214.156
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : cdesc-AnsiFormatter.yaml
--- !ruby/object:RI::ClassDescription 
attributes: []

class_methods: 
- !ruby/object:RI::MethodSummary 
  name: new
comment: 
- !ruby/struct:SM::Flow::P 
  body: This formatter uses ANSI escape sequences to colorize stuff works with pages such as man and less.
constants: 
- !ruby/object:RI::Constant 
  comment: 
  name: HEADINGS
  value: "{       1 => [ \"\\033[1;32m\", \"\\033[m\" ] ,       2 => [\"\\033[4;32m\", \"\\033[m\" ],       3 => [\"\\033[32m\", \"\\033[m\" ]"
- !ruby/object:RI::Constant 
  comment: 
  name: ATTR_MAP
  value: "{       BOLD   => \"1\",       ITALIC => \"33\",       CODE   => \"36\""
full_name: RI::AnsiFormatter
includes: []

instance_methods: 
- !ruby/object:RI::MethodSummary 
  name: bold_print
- !ruby/object:RI::MethodSummary 
  name: display_heading
- !ruby/object:RI::MethodSummary 
  name: update_attributes
- !ruby/object:RI::MethodSummary 
  name: write_attribute_text
name: AnsiFormatter
superclass: AttributeFormatter
© 2025 GrazzMean-Shell