![Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members](https://miro.medium.com/max/1400/1*MfiCfsgFdW7tiEv6BFJAvA.png)
Offensive Security Guide to SSH Tunnels and Proxies | by Russel Van Tuyl | Posts By SpecterOps Team Members
![Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 8.9.00 - BMC Documentation Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 8.9.00 - BMC Documentation](https://docs.bmc.com/docs/tssa89/files/808904217/808904219/2/1528091507174/SOCKSSetUp.png)
Sample setup for the target servers located behind a SOCKS proxy server - Documentation for TrueSight Server Automation 8.9.00 - BMC Documentation
GitHub - Intika-Linux-Proxy/Micro-Socks: Tiny, portable SOCKS5 server with very moderate resource usage
![Secure browsing using a local SOCKS proxy server (on desktop or mobile) and an always free OCI compute instance as SSH server Secure browsing using a local SOCKS proxy server (on desktop or mobile) and an always free OCI compute instance as SSH server](https://technology.amis.nl/wp-content/uploads/2020/02/mobaxterm-tunneling-02-1024x697.png)