Pupy Logo

Pupy

0
Free
Visit Website

Pupy is an open-source, cross-platform C2 and post-exploitation framework written in Python and C, allowing for remote access and control of compromised systems across various operating systems, including Windows, Linux, OSX, and Android. It provides a range of features, including remote shell access, file management, and process manipulation, making it a powerful tool for penetration testers and red teams. Pupy's modular design and extensible architecture enable users to create custom plugins and modules, expanding its capabilities and versatility. Additionally, Pupy supports multiple communication protocols, including HTTP, HTTPS, and DNS, ensuring secure and reliable communication between the compromised system and the command and control server.

FEATURES

ALTERNATIVES

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

A collection of precompiled Windows exploits for privilege escalation.

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

Open-source Java application for creating proxies for traffic analysis & modification.

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

Boofuzz is a network protocol fuzzing tool that aims to fuzz everything

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved