shell bypass 403

GrazzMean-Shell Shell

: /opt/alt/ruby18/share/ri/1.8/system/Resolv/IPv4/ [ drwxr-xr-x ]
Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 3.15.145.175
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : cdesc-IPv4.yaml
--- !ruby/object:RI::ClassDescription 
attributes: 
- !ruby/object:RI::Attribute 
  comment: 
  - !ruby/struct:SM::Flow::P 
    body: The raw IPv4 address as a String.
  name: address
  rw: R
class_methods: 
- !ruby/object:RI::MethodSummary 
  name: create
comment: 
- !ruby/struct:SM::Flow::P 
  body: A Resolv::DNS IPv4 address.
constants: 
- !ruby/object:RI::Constant 
  comment: 
  - !ruby/struct:SM::Flow::P 
    body: Regular expression IPv4 addresses must match.
  name: Regex256
  value: /0                |1(?:[0-9][0-9]?)?                |2(?:[0-4][0-9]?|5[0-5]?|[6-9])?                |[3-9][0-9]?/x
- !ruby/object:RI::Constant 
  comment: 
  name: Regex
  value: /\A(#{Regex256})\.(#{Regex256})\.(#{Regex256})\.(#{Regex256})\z/
full_name: Resolv::IPv4
includes: []

instance_methods: 
- !ruby/object:RI::MethodSummary 
  name: to_name
name: IPv4
superclass: Object
© 2025 GrazzMean-Shell