LogoHackDB
  • Recent
  • Search
  • Pricing
  • Submit
LogoHackDB

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

RedditX (Twitter)
Resources
  • Search
  • Category
  • Tag
Listing
  • Pricing
  • Submit
Pages
  • Home
  • Sitemap
  • Support
Company
  • About Us
  • Privacy Policy
  • Terms of Service
Copyright © 2026 All Rights Reserved.
  1. Home
  2. Category
  3. Pupy
icon of Pupy

Pupy

Pupy is a cross-platform post-exploitation framework and RAT, enabling in-memory execution and low-footprint operations across multiple OS.

Visit WebsiteX (Twitter)Share on X
image of Pupy
Visit Website

Introduction

Pupy

Pupy is a versatile, cross-platform (Windows, Linux, OSX, Android) remote administration tool (RAT) and post-exploitation framework primarily written in Python and C. It emphasizes in-memory execution to minimize its footprint.

Key features include:

  • In-Memory Execution: Windows payloads load the Python interpreter directly from memory, avoiding disk writes.
  • Multi-Transport Communication: Supports modular and stackable communication transports, including HTTP, AES, and XOR.
  • Reflective Process Migration: Enables migration into other processes.
  • Remote Module Loading: Allows importing Python packages and C extensions from memory.
  • Interactive Shells: Provides interactive Python shells with auto-completion on remote interpreters, as well as remote command-line shells with full TTY support.
  • Payload Generation: Generates payloads in various formats, including executables, DLLs, and Python one-liners.
  • Scriptlets: Embeds scriptlets in payloads for offline task execution.

Use cases:

  • Penetration testing and red teaming.
  • Remote system administration.
  • Post-exploitation activities.
Back

Information

  • Publisher
    Admin
  • Websitegithub.com
  • Published date05/23/2025

Categories

  • Exploit Development
  • Red Team Operations
  • Infrastructure Security

Tags

  • C2

More Resources

image of NeroSwarm Deception Lab
Red Team OperationsInfrastructure SecurityReconnaissance
Visit Website

NeroSwarm Deception Lab

Details

NeroSwarm Deception Lab offers free cyber deception tools including honeytoken creation, honeypot script generation, and IP threat reputation checking.

OSINTInternalExternal
image of DLLHijackHunter
Application SecurityBug BountyRed Team Operations
Visit Website

DLLHijackHunter

Details

Automated DLL Hijacking Detection Tool with Zero False Positives — Discovers, filters, and canary-confirms exploitable DLL hijacks on Windows with tiered confidence scoring.

Bug BountyStatic AnalysisInternal
image of Nerva
ReconnaissanceInfrastructure SecurityRed Team OperationsBug Bounty
Visit Website

Nerva

Details

Nerva is a high-performance CLI tool for fast service fingerprinting across 120+ protocols (TCP/UDP/SCTP), built by Praetorian for network reconnaissance.

OSINTExternalInternal