Pupy Logo

Pupy

0
Free
Visit Website

Pupy is an open-source, cross-platform C2 and post-exploitation framework written in Python and C, allowing for remote access and control of compromised systems across various operating systems, including Windows, Linux, OSX, and Android. It provides a range of features, including remote shell access, file management, and process manipulation, making it a powerful tool for penetration testers and red teams. Pupy's modular design and extensible architecture enable users to create custom plugins and modules, expanding its capabilities and versatility. Additionally, Pupy supports multiple communication protocols, including HTTP, HTTPS, and DNS, ensuring secure and reliable communication between the compromised system and the command and control server.

FEATURES

ALTERNATIVES

A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to conceal malicious activities from detection.

Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.

Emulates Docker HTTP API with event logging and AWS deployment script.

A visual guide illustrating attack paths and techniques for exploiting vulnerabilities in GitHub Actions configurations.

An interactive multi-user web JS shell

GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.

A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved