Shootback is a reverse TCP tunnel let you access target behind NAT or firewall Reverse TCP tunnel, so that after the NAT or firewall network machines can be accessed by external networks. Consumes less than 1% CPU and 8MB memory under 800 concurrency.
+ Access company / school computer (no internet IP) from home
+ From home to connect the company or the school does not have an independent external network IP computer
+ Make private network / site public.
+ So that the intranet or intranet site can be accessed from the public network
+ Help private network penetration.
+ Auxiliary internal network penetration
+ Help CTF offline competitions.
+ Auxiliary CTF line play, so that off-site players also get the game network environment
– Master: Python3.4+, OS independent
– Slaver: Python2.7/3.4+, OS independent
– noexternal dependencies, only python std lib
git clone https://github.com/aploium/shootback && cd shootback
python3 slaver.py --help
python3 master.py --help