Pupy Logo

Pupy

0
Free
Visit Website

Pupy is an open-source, cross-platform C2 and post-exploitation framework written in Python and C, allowing for remote access and control of compromised systems across various operating systems, including Windows, Linux, OSX, and Android. It provides a range of features, including remote shell access, file management, and process manipulation, making it a powerful tool for penetration testers and red teams. Pupy's modular design and extensible architecture enable users to create custom plugins and modules, expanding its capabilities and versatility. Additionally, Pupy supports multiple communication protocols, including HTTP, HTTPS, and DNS, ensuring secure and reliable communication between the compromised system and the command and control server.

FEATURES

ALTERNATIVES

A C2 profile generator for Cobalt Strike designed to enhance evasion.

Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

A lightweight, first-stage C2 implant written in Nim for remote access and control.

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

A post-exploitation framework for attacking running AWS infrastructure

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

Modular framework for web services penetration testing with support for various attacks.

PINNED