Absolutely, a trick commonly used in PHP backdoors or webshells is to append a fake image header (eg. "GIF89a"). PHP will happily ignore this and execute the actual code, and it may trick AV or admins in thinking it's an image file.
-
This Tweet is unavailable.
-
This Tweet is unavailable.
-
This Tweet is unavailable.
-
-
This Tweet is unavailable.
Looks genuine to me :)
12:56 AM - 10 Apr 2018
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.