Remote management, diagnostics, and inventory — in your browser

Deliver a secure browser terminal, file transfer, live diagnostics, session recording, and gather inventory without opening any inbound ports and with strong tenant isolation.

Disaster Recovery
Strong isolation
Zero-Touch
Token‑based
Access
Zero-trust ready
Trusted by secure, compliant teams

Everything you need for secure endpoint access

Terminal, file transfer, live diagnostics, and session recording — built for privacy and scale.

Company Isolation
Users only see endpoints within their company. Access control is enforced across UI and API.
Token-based Registration
Agents register with a company token. Rotate tokens any time to invalidate old clients.
Browser Terminal
Open ephemeral, auditable terminal sessions without exposing sensitive tokens or opening inbound ports.
Multi-session Tabs
Open, rename, and switch between multiple live PTY sessions per endpoint with automatic reconnect.
File Browser & Transfers
Navigate directories with breadcrumbs, download large files, and upload securely right from the UI.
Live Diagnostics
View CPU, memory, disk, and network stats in real time to understand system health.
Session Recording & Playback
Automatic recordings with in‑app playback and secure downloads for audits.
Cross‑platform Agents
Linux, macOS, and Windows (ConPTY) supported. Respect system shells and term sizes.
Flexible Deployment & APIs
Self‑host the proxy on our Enterprise Plan. Protect agent and viewer APIs with shared secrets and JWT.
Hardware/Software Inventory
Automatic inventory snapshots (OS/arch, kernel/platform, CPU model, NICs, disks, IPs).
Tasks Across Endpoints
Run commands across selected endpoints with per‑target status. Great for checks and routine automation.
User management
Invite other users to securely share out-of-band access with short-lived tokens.

Security, first principles

  • Strong isolation with company-scoped authorization.
  • Token rotation for both company registration and agent sessions.
  • Minimal surface area: endpoints access via proxy; no inbound ports to agents.
  • CSRF protections for UI; shared-secret protections for proxy APIs.
  • Configurable secrets via environment variables.
  • Audit-ready session recordings stored under your control.
Compliance ready
  • Audit-friendly: Clear separation of duties and scoped access.
  • Data minimization: Recordings are explicit and visible.
  • Encryption in transit and at rest.

How it works

1. Create or Join
Create a company in minutes or accept an invite to an existing one.
2. Register Agents
Install the agent and register using your company token. Agents appear instantly.
3. Connect Securely
Launch a terminal with a short‑lived viewer. Browse files, stream diagnostics, capture inventory, and optionally record sessions — all proxied over encrypted tunnels.

What leaders are saying

rmt.sh gave our teams secure, auditable access without the operational pain of VPN sprawl.”

Andy Glaser
CTO, Northround Tech Systems

“Setup took less than an hour. The isolation model fits our compliance needs perfectly and streamlined our Incident Response.”

Priya Sharma
VP Security, cogentix multisys

“The browser terminal is a game-changer for remote ops, especially during incidents.”

Diego Álvarez
Head of SRE, Frosticam

Simple, transparent pricing

Start free, scale as you grow. See full details on our pricing page.

Frequently asked questions

Can I self-host the proxy?
Yes. rmt.sh supports self-hosting your own proxy on our Enterprise Plan. Please contact us for a demo.
How do invites work?
Create single-use tokens with optional expiry. Recipients sign up via the invite link.
Do you store terminal transcripts?
Session recording are stored and encrypted for audit and compliance reasons. You are able to download the transcripts and secure them for a longer duration.
Can I rotate tokens?
Yes, rotate company registration tokens any time without downtime.
Does it support Windows/macOS/Linux?
Yes. Agents support Linux and macOS; Windows uses ConPTY for a native console experience.
Is file transfer supported?
Yes. Use the built‑in file browser to navigate, download, and upload securely.
Support
Email us at support@rmt.sh
Sales
Talk to our team: sales@rmt.sh
Security
Report issues: security@rmt.sh