Pupy Logo

Pupy

0
Free
Visit Website

Pupy is an open-source, cross-platform C2 and post-exploitation framework written in Python and C, allowing for remote access and control of compromised systems across various operating systems, including Windows, Linux, OSX, and Android. It provides a range of features, including remote shell access, file management, and process manipulation, making it a powerful tool for penetration testers and red teams. Pupy's modular design and extensible architecture enable users to create custom plugins and modules, expanding its capabilities and versatility. Additionally, Pupy supports multiple communication protocols, including HTTP, HTTPS, and DNS, ensuring secure and reliable communication between the compromised system and the command and control server.

FEATURES

ALTERNATIVES

Setup script for Regon-ng

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.

Alpha release of External C2 framework for Cobalt Strike with enhanced data channels.

CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.

Interactive online malware sandbox for real-time analysis and threat intelligence

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

PINNED