common ways to breach network. Including proxy, port forward, ssh tunnel, and backconnect.
 
 
 
Go to file
Evan Chen 77e55499a4
continuous-integration/drone/tag Build is passing Details
refact: change repo name
2021-11-06 12:34:41 +08:00
breach refact: change repo name 2021-11-06 12:34:41 +08:00
.drone.yml refact: change repo name 2021-11-06 12:34:41 +08:00
.gitignore initial commit 2021-11-05 02:20:20 +08:00
Dockerfile refact: change repo name 2021-11-06 12:34:41 +08:00
README.md refact: change repo name 2021-11-06 12:34:41 +08:00
go.mod refact: change repo name 2021-11-06 12:34:41 +08:00
go.sum initial commit 2021-11-05 02:20:20 +08:00
main.go refact: change repo name 2021-11-06 12:34:41 +08:00
release.sh refact: change repo name 2021-11-06 12:34:41 +08:00

README.md

Breach

common ways to breach network. Including proxy, port forward, ssh tunnel, and backconnect in a single executable

Install

sudo rm -f /usr/local/bin/breach
sudo sh -c "curl -fsSL RELEASE_URL | tar -C /usr/local/bin/ -xz"

Usage

Usage:
  breach [command]

Available Commands:
  forward     port forwarding for UDP->UDP / TCP->TCP
  help        Help about any command
  proxy       reverse proxy to url
  tunnel      ssh tunneling to access remote services
  version     Print the version number of breach

Flags:
  -h, --help      help for breach
  -s, --silent    silent log output
  -v, --version   version for breach

Use "breach [command] --help" for more information about a command.

Systemd

[Unit]
Description=Breach

[Service]
ExecStart=/usr/local/bin/breach tunnel :8080 :80 user@example.com -i ~/.ssh/id_rsa
Restart=always

[Install]
WantedBy=multi-user.target