Remot3d – A Simple Tool Created For Large Pentesters

Remot 3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that runs a PHP program language.

It’s easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program.

Made to bypass the system that is disabled on the server, especially for reading sensitive files that are /etc/passwd.

Also Read:Stardox – Github Stargazers Information Gathering Tool

List of Remot 3d Functions

  • Create backdoor for windows or Linux servers (can run php file)
  • Bypass disable function’s with imap_open vulnerability
  • Bypass read file /etc/passwd with cURL or Unique Logic Script’s
  • Generating Backdoor and can be remoted on Tools
  • Some other fun stuff 🙂

Installing

git clone https://github.com/KeepWannabe/Remot3d
cd Remot3d
chmod +x Remot3d.sh && ./Remot3d.sh

Operating Systems We Recommend :

  • Linux mint (Ubuntu Based with Mate DE)
  • Parrot
  • BackTrack
  • Backbox
  • DracOS
  • IbisLinux

Screenshots

Credit: Abdi Prawira N ,Bayu Fedra,Novran Fathir, Ardhana Resky, Agus Setya R,Edo -maland,IndoXploit – ZeroByte.ID.

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 hours ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

23 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

1 day ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 day ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 day ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 day ago