From 873529d486268a5efac97b227dca145919e4e658 Mon Sep 17 00:00:00 2001 From: skyper <5938498+SkyperTHC@users.noreply.github.com> Date: Thu, 23 Nov 2023 09:52:38 +0000 Subject: [PATCH] Update README.md --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index 0171e34..2950f6d 100644 --- a/README.md +++ b/README.md @@ -502,6 +502,8 @@ socat TCP-LISTEN:25,reuseaddr,fork openssl-connect:smtp.gmail.com:465 Using [segfault.net](https://thc.org/segfault.net) (free): ```sh +# Request a random public TCP port: +curl sf/port echo "Your public IP:PORT is $(cat /config/self/reverse_ip):$(cat /config/self/reverse_port)" nc -vnlp $(cat /config/self/reverse_port) ``` @@ -512,6 +514,12 @@ Using [bore.pub](https://github.com/ekzhang/bore) (free): bore local 31337 --to bore.pub ``` +using [serveo.net](https://serveo.net) (free): +```sh +# Forward a random public TCP port to localhost:31337 +ssh -R 0:localhost:31337 serveo.net +``` + See also [remote.moe](#revese-shell-remote-moe) (free) to forward raw TCP from the target to your workstation or [ngrok](https://ngrok.com/) (paid subscription) to forward a raw public TCP port. Other free services are limited to forward HTTPS only (not raw TCP). Some tricks below show how to tunnel raw TCP over HTTPS forwards (using websockets).