tcp2tor-proxy
Victim allows another victim to access a Hidden Service through it. Useful to gaining access to victims in isolated networks.
This tool allows the victim to set up a service that forwards TCP traffic to a Hidden Service. Then, an victim inside an internal network can access a Hidden Service pivoting over the victim that executes this tool.
Some parameters need to be set:
Last updated