Pupy
๐ฅ Offensive Ops ยท Python
Pupy is an open-source, cross-platform command and control (C2) framework and remote administration tool written in Python and C, supporting Windows, Linux, macOS, and Android targets. It operates entirely in-memory using reflective injection techniques, leaving minimal forensic footprint on compromised systems while providing a comprehensive post-exploitation toolkit. Red team operators and penetration testers use Pupy for persistent access, lateral movement, credential harvesting, and data exfiltration during authorized engagements. Its modular architecture supports custom transport protocols, encrypted communications, and a wide range of post-exploitation modules including keylogging, screenshot capture, webcam access, and privilege escalation.
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- n1nj4sec/pupy
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
No reviews yet. Be the first to review Pupy.
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.