Skip to content

Commit 61af71c

Browse files
author
R00t-Shell
authored
Update README.md
1 parent 2056e34 commit 61af71c

File tree

1 file changed

+67
-1
lines changed

1 file changed

+67
-1
lines changed

README.md

Lines changed: 67 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,67 @@
1-
# Gecko-Shell
1+
# Gecko Web Backdoor Tool
2+
3+
![Gecko Shell](https://r00t-shell.com/wp-content/uploads/2025/02/Gecko-Shell.png)
4+
*Gecko-Shell - A Powerful Web Backdoor Tool for Penetration Testing and Security Bypass*
5+
6+
Gecko is an advanced web backdoor tool designed to bypass security measures, provide root access, and manage shells. It offers a wide range of features for users who need to exploit security weaknesses and gain full control over compromised servers.
7+
8+
## Features
9+
10+
- **Bypass Errors:** Seamlessly bypass 403, 404, and 500 errors.
11+
- **Linux Exploit Suggester:** Suggests potential exploits for Linux systems.
12+
- **Backdoor Destroyer:** Removes any existing backdoors to secure the system.
13+
- **Auto Root with Pwnkit:** Automatically gain root access to Linux servers.
14+
- **Add Admin User to WordPress:** Add a new admin user to a compromised WordPress site.
15+
- **Lock Shell & File:** Secure shells and files to prevent unauthorized access.
16+
- **Cpanel Reset and Backconnect:** Includes Cpanel reset, Adminer, and backconnect features.
17+
- **Hash Identifier:** Identifies different hash types.
18+
- **Archive Compressor/Decompressor:** Compress and decompress archives effortlessly.
19+
- **No Detection Shell:** Ensures your shell remains undetected.
20+
21+
## Installation and Setup
22+
23+
To install and configure Gecko, follow these steps:
24+
25+
1. **Download Gecko:**
26+
Download the [Gecko tool](https://github.com/RootShelll/Gecko-Shell) from GitHub.
27+
28+
2. **Upload Gecko-Shell.php:**
29+
Upload the `Gecko-Shell.php` file to your target server.
30+
31+
3. **Access the File:**
32+
Open the uploaded file in your browser and use the various tools provided by Gecko.
33+
34+
### Note
35+
Always use this tool responsibly. We are not responsible for any illegal activities.
36+
37+
## Usage Instructions
38+
39+
### 1. Bypass Security Measures
40+
Gecko can bypass common errors like 403, 404, and 500 to ensure unimpeded access, even if strict security settings are in place.
41+
42+
### 2. Gain Root Access
43+
Gecko automates root access to Linux servers using tools like Pwnkit, allowing privilege escalation and full system control.
44+
45+
### 3. Add Admin User to WordPress
46+
For WordPress targets, Gecko enables the addition of a new admin user to the WordPress installation. This helps in gaining admin privileges on compromised sites.
47+
48+
### 4. Backdoor Destroyer
49+
Gecko’s backdoor destroyer feature ensures that no malicious files remain by removing previously created backdoors after use.
50+
51+
## Gecko Use Cases
52+
53+
Gecko can be used for:
54+
55+
- **Penetration Testing:** Perform authorized penetration testing and vulnerability assessments on your own systems.
56+
- **Remote Shell Management:** Manage and maintain access to remote shells in testing scenarios.
57+
- **Security Research:** Conduct security research and simulate exploitation on your own infrastructure.
58+
59+
> **Important:** Always adhere to ethical hacking practices. Ensure you have permission before testing or deploying any of these tools on external servers or websites.
60+
61+
## Contributing
62+
63+
Feel free to fork this repository and contribute to the ongoing development of Gecko. We welcome contributions that improve security, expand features, or enhance documentation.
64+
65+
## License
66+
67+
Gecko is licensed under the [MIT License](LICENSE).

0 commit comments

Comments
 (0)