SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 07:51:02
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : canontst.xml
<?xml version="1.0" encoding="ISO-8859-1"?>
<?pre_doctype 
  hello ?>
<!DOCTYPE ctest SYSTEM "ctest.dtd"
 [
  <?in_doctype there ?>
 ]
>
<?pre_r1
                     testing?><?pre_r2             one two?>
<ctest xmlns:x="urn:1" xmlns:y="urn:2" version='0.5'>
  <x:e a="a"/>
  <foo xmlns='urn:3' z="hello" y:b="there" k="world">
    <bar/>
    Here is a PI: <?inside   
             more pi testing ?>. Like it?
  </foo>
  <la y:b='b'  a='tab->(	)    qtab->(&#x9;) junk   '/>
</ctest>
<?post_root last stuff?>
© 2025 Faizzz-Chin