Stunnel

Stunnel
Download Copy
Title: Stunnel
Author: p4p1

pass a unsecure protocol through a SSL connection

There are many forms of remote access which may be used by different actors for various purposes. A red team may use remote access techniques that provide persistent access to an exploited target for the purposes of reconnaissance and lateral movement across the network. A systems administrator may use remote access to perform day to day operations on a network accessible computer. An array of techniques exist to obtain and maintain remote access across a network, including using a command and control server such as Cloud C². Common remote access techniques include reverse shells and may employ obfuscation techniques to mask the connection. See all remote access payloads.

This payload is for the LAN Turtle a Remote Access Toolkit posing as an ordinary USB Ethernet adapter. Drop it on a LAN for an instant backdoor shell. It's no wonder the LAN Turtle has been featured in Mr. Robot & National Geographic!

Submit your own payload, or browse more featured LAN Turtle Payloads.

 

 

Related Payloads

Linux Blind Serial Command Injection
Linux Blind Serial Command Injection
Allows a remote attacker to execute commands on a Linux system via a serial connection, without receiving feedback on th
Read More
BlueBunny
BlueBunny
BlueBunny is a C2 solution that communicates directly over Bluetooth-Low-Energy with your Bash Bunny Mark II. Send your
Read More
Blind OS Command Injection using Serial Number
Blind OS Command Injection using Serial Number
This payload allows a remote attacker to execute commands on a Linux system using the serial number as a vector to pass
Read More