shell bypass 403

GrazzMean-Shell Shell

: /usr/lib/systemd/system/ [ drwxr-xr-x ]
Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 18.224.169.152
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : imunify-antivirus.service
[Unit]
Description=ImunifyAV
After=network.target
Requires=imunify-antivirus.socket imunify-antivirus-user.socket imunify-antivirus-sensor.socket
Wants=imunify-notifier.socket

[Service]
Environment=PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION=cpp
Environment=LANG=en_US.UTF-8
Environment=LC_ALL=en_US.UTF-8
Environment=PYTHONNOUSERSITE=1
Environment=SQLITE_TMPDIR=/var/imunify360/tmp
Type=simple
ExecStart=/usr/bin/imunify-service
ExecStartPost=/bin/bash -c "echo $MAINPID > /var/run/imunify-antivirus.pid"
PIDFile=/var/run/imunify-antivirus.pid
#TODO: must be not less than defence360agent/cli/server.py:stop(seconds=8)
TimeoutStopSec=60
RestartSec=5
StartLimitInterval=600s
StartLimitBurst=5
# Orphans child processes instead of killing them when the main process is shut down.
KillMode=process

[Install]
WantedBy=multi-user.target
# Alias does not work in ubuntu. Used [Socket]Service= in imunify-antivirus-user.socket instead
#Alias=imunify-antivirus-user.service
© 2025 GrazzMean-Shell