Files
PentestPilot/bin/misc/port_forward.sh
PentestPilot Bot 461c14d676 feat: bootstrap PentestPilot toolkit, docs, and orchestrators
Initial commit of PentestPilot — AI‑assisted pentest recon and orchestration toolkit.\n\nHighlights:\n- Resumeable pipelines (full_pipeline) with manifest state and elapsed timings\n- Rich dashboard (colors, severity bars, durations, compact/json modes)\n- Web helpers: httpx→nuclei auto, tech routing + quick scanners\n- Agents: multi‑task orchestrator (web/full/ad/notes/post) with resume\n- AD/SMB, password utils, shells, transfer, privesc, tunnels\n- QoL scripts: proxy toggle, cleanup, tmux init, URL extractor\n- Docs: README (Quick Start + Docs Index), HOWTO (deep guide), TOOLKIT (catalog with examples)\n\nStructure:\n- bin/automation: pipelines, dashboard, manifest, resume, tech_actions\n- bin/web: routing, scanners, helpers\n- bin/ai: orchestrators + robust AI utils\n- bin/ad, bin/passwords, bin/shells, bin/transfer, bin/privesc, bin/misc, bin/dns, bin/scan, bin/windows, bin/hashes\n- HOWTO.md and TOOLKIT.md cross‑linked with examples\n\nUse:\n- settarget <target>; agent full <domain|hosts.txt>; dashboard --compact\n- See HOWTO.md for setup, semantics, and examples.
2025-10-08 16:00:22 +02:00

41 lines
841 B
Bash
Executable File

#!/usr/bin/env bash
set -euo pipefail
usage(){
cat >&2 <<USAGE
Usage:
Local forward (access remote service locally):
$(basename "$0") -L <lport>:<rhost>:<rport> <user>@<ssh_host>
Remote forward (expose local service to remote):
$(basename "$0") -R <rport>:<lhost>:<lport> <user>@<ssh_host>
Dynamic SOCKS proxy:
$(basename "$0") -D <lport> <user>@<ssh_host>
USAGE
exit 1
}
[[ $# -lt 2 ]] && usage
flag=$1; spec=$2; host=${3:-}
case "$flag" in
-L)
[[ -z "$host" ]] && usage
echo "[+] ssh -N -L $spec $host"
exec ssh -N -L "$spec" "$host"
;;
-R)
[[ -z "$host" ]] && usage
echo "[+] ssh -N -R $spec $host"
exec ssh -N -R "$spec" "$host"
;;
-D)
host=$spec; lport=${host:-1080}
echo "[+] ssh -N -D $lport $host"
exec ssh -N -D "$lport" "$host"
;;
*) usage;;
esac