shell bypass 403

GrazzMean-Shell Shell

Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 52.14.127.77
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : syscall-i.yaml
--- !ruby/object:RI::MethodDescription 
aliases: []

block_params: 
comment: 
- !ruby/struct:SM::Flow::P 
  body: Calls the operating system function identified by <em>fixnum</em>, passing in the arguments, which must be either <tt>String</tt> objects, or <tt>Integer</tt> objects that ultimately fit within a native <tt>long</tt>. Up to nine parameters may be passed (14 on the Atari-ST). The function identified by <em>fixnum</em> is system dependent. On some Unix systems, the numbers may be obtained from a header file called <tt>syscall.h</tt>.
- !ruby/struct:SM::Flow::VERB 
  body: "   syscall 4, 1, &quot;hello\\n&quot;, 6   # '4' is write(2) on our box\n"
- !ruby/struct:SM::Flow::P 
  body: <em>produces:</em>
- !ruby/struct:SM::Flow::VERB 
  body: "   hello\n"
full_name: Kernel#syscall
is_singleton: false
name: syscall
params: |
  syscall(fixnum [, args...])   => integer

visibility: public
© 2025 GrazzMean-Shell