Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, pytho…
☆90Mar 27, 2018Updated 7 years ago
Alternatives and similar repositories for pupy
Users that are interested in pupy are comparing it to the libraries listed below
Sorting:
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Windows DPAPI laboratory☆12Mar 5, 2018Updated 8 years ago
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆19Mar 12, 2020Updated 6 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- Text messages (SMS) for two-factor authentication, generating all possible/likely codes☆15Aug 4, 2019Updated 6 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆12Nov 5, 2020Updated 5 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 7 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- bootableusb - Ön yüklemeli USB sürücü oluştur☆10Sep 14, 2017Updated 8 years ago
- ☆25Feb 28, 2024Updated 2 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- Telegram Login Widget Authentication Plugin for Jellyfin☆23Jan 11, 2026Updated 2 months ago
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Virus RAT v8.0 Beta☆28Mar 4, 2017Updated 9 years ago
- Sqlmap for lazy people☆20Oct 1, 2020Updated 5 years ago
- ☆13Apr 19, 2018Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 8 years ago