Five permanent free intranet penetration methods for fools to use

Method one (using qydev)

Official website: Click to visit
1. Official website page: Find the client download

2. Find the version corresponding to your computer or running platform (mine is Windows 64-bit)

3. After downloading, unzip it to a file you are familiar with and save it. After unzipping, ignore it for the time being and continue to step 4.

4. Log in to the official website backend: add a new tunnel
and click Tunnel Management –> Open Tunnel

Just fill in these 4 items:

Tunnel protocol selection: http
tunnel name: take a unique name.
Prefix domain name: the prefix of the domain name. For example: qydev.free.qydev.com, change to custom.free.qydev.com.
Local port: the port that needs to be penetrated .

After opening, check the tunnel list: Copy the keycode, open the file decompressed in the third step: double-click qydev-frp startup tool-64.bat - fill in the copied keycode, and then press Enter

qydev-frp startup tool-64.bat startup interface: fill in the copied keycode and press Enter

Access: Original address:127.0.0.1

After mapping:

Remember not to change the entire custom domain name, just the prefix. For example: I changed the domain name to the following one and it cannot be accessed. It must be followed by .free.qydev.com

The correct one is: custom prefix.free.qydev.com

Method 2 (Use Feige intranet penetration)

Official website: Click to visit
and method one is a routine: open the official website –> register –> log in –> open the port mapping tunnel –> download the startup tool –> start

1. Open the official website (I will omit registration) and find the client download.
Depending on the platform your computer is running on, mine is Windows 64-bit.

2. After downloading, extract it to a familiar folder.

3. At this time, we need a startup parameter to start our own mapping client. Log in to the Feige backend management page, find the tunnel opening and select free .

Select a free tunnel, enter the add page, and fill in the corresponding parameters.

After the addition is successful, on the tunnel management page, find the tunnel we just added. Click the + sign next to the tunnel ID to display the tunnel startup command. The most important step is here. Copy the startup command and open the downloaded Feige client. client, copy the startup command to the client, and the startup is completed.

Copy the startup command, open the downloaded Feige client, copy the startup command to the client, and the startup is completed.

Method three (using nps)

The official introduction is this: nps is a lightweight, high-performance, and powerful intranet penetration proxy server. Currently, it supports TCP and UDP traffic forwarding, and can support any TCP and UDP upper-layer protocols (access to intranet websites, local payment interface debugging, SSH access, remote desktop, intranet DNS resolution, etc...), and also supports intranet http proxy. , intranet socks5 proxy, p2p, etc., and comes with a powerful web management terminal.

perfectly worked! ! ! ! perfectly worked! ! !
github address: click to visit

Method 4 Use (Shenzhuo Internet Intranet Penetration)

Shenzhuo Internet intranet penetration is an enterprise-level mapping tool. The first two are sufficient for personal use. The tutorial on Shenzhuo Internet intranet penetration refers to the address tutorial.

Shenzhuo Internet Intranet Penetration Usage Tutorial: Click to visit

Method 5: Use SAKURA FRP

Address: Click to visit

Method 6: Use network cloud penetration

Address: Click to visit

Method 7: Use Shanku

Address: Click to visit

Method 8: Use Dragonfly mapping

Address: Click to visit

Method nine uses pole cloud

Recommended for use. I have been using it for a long time. It is not recommended for commercial use as it will steal traffic.
Address: Click to visit

Peanut Shell is not recommended because there are too few tunnels and the bandwidth is low. It also requires 6 quick bucks, so it is not free.

Guess you like

Origin blog.csdn.net/weixin_40808668/article/details/132612583