Insiders as well as threat actors can ingress into an environment via ngrok, which functions as a reverse proxy. ngrok is no longer open source but the previous source code is still available (linked below).
Initial ngrok configuration.
ngrok authtoken 'AUTHTOKEN_GOES_HERE'
Sends connection to configured upstream service on port.
ngrok tcp|http <PORT>