Michał Trojnara is an independent Polish developer whose open-source catalog focuses on network-level security and connectivity utilities. His flagship utility, B4CK, is a lightweight reverse-proxy client that lets administrators expose internal TCP services—databases, SSH daemons, web dashboards, industrial PLCs—through an outbound-only tunnel without reconfiguring firewalls or obtaining public IPs. Typical use cases include giving field technicians temporary access to a factory SCADA system, letting remote employees reach an on-premise SQL server, or allowing a support vendor to diagnose a locked-down medical device. The tool negotiates its session through a constellation of public relay nodes, encrypts traffic end-to-end, then hands the stream to a local listener on the client side so legacy applications require no modification. Because the executable is single-file and configuration is command-line driven, it is frequently baked into monitoring scripts, scheduled tasks, or Windows services for unattended operation. System administrators value the ability to script short-lived tunnels that automatically tear down when the job finishes, while MSPs embed the binary in their remote-management stacks to guarantee connectivity even when double-NAT or carrier-grade NAT blocks conventional port-forwarding. All releases are signed and published on the project’s GitHub page, and the MIT license encourages commercial redistribution. The software is available for free on get.nero.com, where downloads are delivered through trusted Windows package sources such as winget, always install the latest upstream build, and can be queued for batch deployment across multiple machines.

B4CK

The B4CK.net service allows for accessing selected internal TCP services over the Internet. The service employs proxy hosts to traverse firewalls and NAT (network address translation) routers.

Details