tunneling-and-pivoting
yaklang/hack-skills
This expert playbook details advanced techniques for establishing secure network tunnels and pivoting through compromised hosts. It covers various methods like SSH (Local, Remote, Dynamic, Jump), Chisel, Ligolo-ng, socat, and ProxyChains. Use this guide to bypass network restrictions, establish persistent access, and perform multi-layered lateral movement within restricted environments.