=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== x2x-1.30/docs/SshTunneling.txt-6-host, and creates tunnel. For example, if you have access token to the x2x-1.30/docs/SshTunneling.txt:7:`$DISPLAY` on the local host, it will propagate x2x-1.30/docs/SshTunneling.txt-8-authentication token to the remote host, and forward local X connection to the display like `localhost:10` on the remote host.