SHELL BYPASS 403 |
Modern UI. Responsive. Powerful.

Faizzz-Chin Shell

: /usr/share/doc/pyliblzma-0.5.3/ [ drwxr-xr-x ]
Uname\Kernel: Linux server.kxo.bgz.mybluehostin.me 3.10.0-1160.119.1.el7.tuxcare.els19.x86_64 #1 SMP Mon Mar 31 17:29:00 UTC 2025 x86_64
Server: Apache
PHP Version: 8.2.28 [ PHP INFO ]
Operating System: Linux
Server Ip: 162.240.163.222
Your Ip: 216.73.216.114
Date Time: 2025-07-11 04:55:05
User: dilseshaadi (1027) | Group: dilseshaadi (1027)
Safe Mode: OFF
Disable Function: exec,passthru,shell_exec,system

name : THANKS

Thanks
------

This module would be a whole lot harder to write if it weren't for help and
inspiration by others. So I'd like to thank the following people:
* Lasse Collin, the author of lzma utils and liblzma, providing me with a lot
  of help, understanding and insight on LZMA.
* Gustavo Niemeyer, for help and advice on C/Python and also benefitting a lot
  from his python bz2 module which helped me out a lot as a reference.
* Whoever wrote the python zlib module which also helped as a reference.
* Joachim Bauch, author of pylzma (different format, different language),
  for much the same as well his his regression tests that I based some of mine
  on.

Thx!
© 2025 Faizzz-Chin