Pupy is an open-source, cross-platform C2 and post-exploitation framework written in Python and C, allowing for remote access and control of compromised systems across various operating systems, including Windows, Linux, OSX, and Android. It provides a range of features, including remote shell access, file management, and process manipulation, making it a powerful tool for penetration testers and red teams. Pupy's modular design and extensible architecture enable users to create custom plugins and modules, expanding its capabilities and versatility. Additionally, Pupy supports multiple communication protocols, including HTTP, HTTPS, and DNS, ensuring secure and reliable communication between the compromised system and the command and control server.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A blog post discussing the often overlooked dangers of CSV injection in applications.
A framework for testing and exploiting race conditions in software
Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.
A modular, menu-driven tool for building repeatable, time-delayed, distributed security events.
Alpha release of External C2 framework for Cobalt Strike with enhanced data channels.
Open-source project for building instrumented environments to simulate attacks and test detections.