pwncat
FeaturedMIT๐ฅ Offensive Ops ยท Python
pwncat is a post-exploitation platform that wraps around a standard reverse or bind shell to provide additional functionality. It automatically enumerates the target, uploads tools, manages file transfers, installs persistence mechanisms, and attempts privilege escalation - all through a single shell session. pwncat supports both Linux and Windows targets and provides a module system for extensibility. It turns a dumb shell into a full post-exploitation environment.
Installation
$ pip install pwncat-csUse Cases
- Upgrading dumb shells to full post-exploitation platforms
- Automated privilege escalation enumeration
- Persistence mechanism deployment
- File upload/download management
- Target environment enumeration
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Python
- Repository
- calebstewart/pwncat
- License
- MIT
- Platforms
- ๐งlinux๐macos
Links
Community Reviews
Alternatives & Comparisons
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
Compare pwncat vs Metasploit FrameworkMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.