===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
x2x-1.30/docs/SshTunneling.txt-6-host, and creates tunnel. For example, if you have access token to the
x2x-1.30/docs/SshTunneling.txt:7:`$DISPLAY` on the local host, it will propagate
x2x-1.30/docs/SshTunneling.txt-8-authentication token to the remote host, and forward local X connection to the display like `localhost:10` on the remote host.