diff --git a/README.md b/README.md index 6daa2d7..10244a5 100644 --- a/README.md +++ b/README.md @@ -35,7 +35,8 @@ pingtunnel.exe -type client -l :4455 -s www.yourserver.com -sock5 1 * 大功告成,然后你就可以开始和本机的:4455端口通信,数据都被自动转发到远端,如同连接到www.yourserver.com:4455一样。 Then you can start communicating with the local: 4455 port, the data is automatically forwarded to the remote, as you connect to www.yourserver.com:4455. ## Download -https://github.com/esrrhs/pingtunnel/releases +cmd: https://github.com/esrrhs/pingtunnel/releases +qt: https://github.com/esrrhs/pingtunnel-qt # Usage 通过伪造ping,把tcp/udp/sock5流量通过远程服务器转发到目的服务器上。用于突破某些运营商封锁TCP/UDP流量。