shootback - a reverse TCP tunnel let you access target behind NAT or firewall.

shootback – a reverse TCP tunnel let you access target behind NAT or firewall.

Shootback is a reverse TCP tunnel let you access target behind NAT or firewall Reverse TCP tunnel, so that after the NAT or firewall network machines can be accessed by external networks. Consumes less than 1% CPU and 8MB memory under 800 concurrency.

shootback_master

Typical Scene
+ Access company / school computer (no internet IP) from home
+ From home to connect the company or the school does not have an independent external network IP computer
+ Make private network / site public.
+ So that the intranet or intranet site can be accessed from the public network
+ Help private network penetration.
+ Auxiliary internal network penetration
+ Help CTF offline competitions.
+ Auxiliary CTF line play, so that off-site players also get the game network environment

shootback_slaver

requirement:
– Master: Python3.4+, OS independent
– Slaver: Python2.7/3.4+, OS independent
– noexternal dependencies, only python std lib

Usage:

Source: https://github.com/aploium