shell bypass 403

GrazzMean-Shell Shell

Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 3.17.162.245
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : cdesc-Shellwords.yaml
--- !ruby/object:RI::ClassDescription 
attributes: []

class_methods: []

comment: 
- !ruby/struct:SM::Flow::P 
  body: This module manipulates strings according to the word parsing rules of the UNIX Bourne shell.
- !ruby/struct:SM::Flow::P 
  body: The shellwords() function was originally a port of shellwords.pl, but modified to conform to POSIX / SUSv3 (IEEE Std 1003.1-2001).
- !ruby/struct:SM::Flow::P 
  body: "Authors:"
- !ruby/struct:SM::Flow::VERB 
  body: "  - Wakou Aoyama\n  - Akinori MUSHA <knu@iDaemons.org>\n"
- !ruby/struct:SM::Flow::P 
  body: "Contact:"
- !ruby/struct:SM::Flow::VERB 
  body: "  - Akinori MUSHA <knu@iDaemons.org> (current maintainer)\n"
constants: []

full_name: Shellwords
includes: []

instance_methods: 
- !ruby/object:RI::MethodSummary 
  name: escape
- !ruby/object:RI::MethodSummary 
  name: join
- !ruby/object:RI::MethodSummary 
  name: shellescape
- !ruby/object:RI::MethodSummary 
  name: shelljoin
- !ruby/object:RI::MethodSummary 
  name: shellsplit
- !ruby/object:RI::MethodSummary 
  name: shellwords
- !ruby/object:RI::MethodSummary 
  name: split
name: Shellwords
superclass: 
© 2025 GrazzMean-Shell