Packages and Binaries:
ligolo-ng
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection using a tun interface (without the need of SOCKS).
Installed size: 25.67 MB
How to install: sudo apt install ligolo-ng
Dependencies:
- libc6
ligolo-agent
root@kali:~# ligolo-agent -h
-accept-fingerprint string
accept certificates matching the following SHA256 fingerprint (hex format)
-bind string
bind to ip:port
-connect string
connect to proxy (domain:port)
-ignore-cert
ignore TLS certificate validation (dangerous), only for debug purposes
-proxy string
proxy URL address (http://admin:[email protected]:8080) or socks://admin:[email protected]:8080
-retry
auto-retry on error
-ua string
HTTP User-Agent (default "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36")
-v enable verbose mode
-version
show the current version
ligolo-proxy
root@kali:~# ligolo-proxy -h
-allow-domains string
autocert authorised domains, if empty, allow all domains, multiple domains should be comma-separated.
-autocert
automatically request letsencrypt certificates, requires port 80 to be accessible
-certfile string
TLS server certificate (default "certs/cert.pem")
-config string
the config file to use
-cpuprofile file
write cpu profile to file
-daemon
run as daemon mode (no CLI)
-keyfile string
TLS server key (default "certs/key.pem")
-laddr string
listening address (prefix with https:// for websocket) (default "0.0.0.0:11601")
-memprofile file
write memory profile to file
-nobanner
don't show banner on startup
-selfcert
dynamically generate self-signed certificates
-selfcert-domain string
The selfcert TLS domain to use (default "ligolo")
-v enable verbose mode
-version
show the current version
Updated on: 2025-May-20