Sshrd Script 📢 🆓

./sshrd.sh --target bastion.corp.local --jump dr-vm.internal --payload restore_toolkit.tar.gz

Then, a new line appeared:

Lin’s fingers flew across the keyboard, each keystroke a tiny act of defiance. On her screen, a single line of text glowed in the terminal: sshrd script

The script was called sshrd.sh . Short for “SSH Rapid Deployment.” She’d written it years ago as a joke, a way to push her dotfiles and a rescue toolkit to any server she could SSH into. It was a dumb, beautiful hack: one script that turned any SSH session into a backdoor pipeline. You’d run it on your local machine, it would ssh into a target, scp a payload, and then ssh again to execute it. Crude. Elegant. Dangerous.

The terminal spat out lines:

But this time, she’d added a twist. The restore_toolkit contained not just backup utilities, but a decoy: a small, self-deleting worm that would mimic the ransomware’s beacon—reporting back to the attacker’s C2 that the bastion was also dead. A lie wrapped in an SSH tunnel, delivered by her own homemade script.

And in the bottom corner of her screen, the prompt blinked patiently, waiting for the next command. It was a dumb, beautiful hack: one script

Thirty seconds felt like thirty years.