{
	"id": "d657c622-9479-41c8-9757-b0028c3d8507",
	"created_at": "2026-04-06T00:16:22.996062Z",
	"updated_at": "2026-04-12T02:21:00.75495Z",
	"deleted_at": null,
	"sha1_hash": "485364e4a9e693f2f77fae32baff8cde0d2854e9",
	"title": "GitHub - n1nj4sec/pupy: Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 66167,
	"plain_text": "GitHub - n1nj4sec/pupy: Pupy is an opensource, cross-platform\r\n(Windows, Linux, OSX, Android) C2 and post-exploitation\r\nframework written in python and C\r\nBy n1nj4sec\r\nArchived: 2026-04-05 13:38:47 UTC\r\nBuild Status\r\nSimple Installation\r\npip3 install pipx\r\npipx ensurepath\r\npipx install git+https://github.com/n1nj4sec/pupy@nextgen\r\npupysh\r\nIf you want more detailed information Refer to the wiki\r\nDevelopment Install\r\ngit clone https://github.com/n1nj4sec/pupy\r\ncd pupy\r\ngit checkout nextgen\r\ngit submodule init\r\ngit submodule update\r\npip install venv\r\npython3 -m venv pupyvenv\r\nsource pupyvenv/bin/activate\r\npip install -r requirements.txt\r\nrun pupysh from the dev install :\r\nsource pupyenv/bin/activate\r\npython3 -m pupy.cli\r\nDescription\r\nhttps://github.com/n1nj4sec/pupy\r\nPage 1 of 5\n\nPupy is a cross-platform, multi function C2 and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple transports,\r\nmigrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.\r\nFeatures\r\nWindows payload can load the entire Python interpreter from memory using a reflective DLL.\r\nPupy does not touch the disk.\r\nCan be packed into a single .py file and run without any dependencies other than the python standard\r\nlibrary on all OSes.\r\nPyCrypto gets replaced by pure Python AES \u0026 RSA implementations when unavailable.\r\nReflectively migrate into other processes.\r\nRemotely import pure python packages (.py, .pyc) and compiled python C extensions (.pyd, .so) from\r\nmemory.\r\nImported python modules do not touch the disk.\r\nEasily extensible, modules are simple to write and are sorted by os and category.\r\nModules can directly access python objects on the remote client using rpyc.\r\nAccess remote objects interactively from the pupy shell and get auto-completion of remote attributes.\r\nCommunication transports are modular and stackable. Exfiltrate data using HTTP over HTTP over AES\r\nover XOR, or any combination of the available transports.\r\nCommunicate using obfsproxy pluggable transports.\r\nExecute noninteractive commands on multiple hosts at once.\r\nCommands and scripts running on remote hosts are interruptible.\r\nAuto-completion for commands and arguments.\r\nCustom config can be defined: command aliases, modules. automatically run at connection, etc.\r\nOpen interactive python shells with auto-completion on the all-in-memory remote python interpreter.\r\nInteractive shells (cmd.exe, /bin/bash, etc) can be opened remotely.\r\nRemote shells on Unix \u0026 Windows clients have a real tty with all keyboard signals working just\r\nlike an SSH shell.\r\nExecute PE executable remotely and from memory.\r\nhttps://github.com/n1nj4sec/pupy\r\nPage 2 of 5\n\nGenerate payloads in various formats:\r\nFormat Architecture Short Name\r\n~~ Android Package ~~ x86 \u0026 ARMv7 apk\r\nLinux Binary x86 lin_x86\r\nLinux Binary x64 lin_x64\r\nLinux Shared Object x86 so_x86\r\nLinux Shared Object x64 so_x64\r\nWindows PE Executable x86 exe_x86\r\nWindows PE Executable x64 exe_x64\r\nWindows DLL x86 dll_x86\r\nWindows DLL x64 dll_x64\r\nPython Script x86 \u0026 x64 py\r\nPython Oneliner x86 \u0026 x64 py_oneliner\r\nPowershell x86 \u0026 x64 ps1\r\nPowershell Oneliner x86 \u0026 x64 ps1_oneliner\r\nDeploy in memory from a single command line using python or powershell one-liners.\r\nEmbed \"scriptlets\" in generated payloads to perform some tasks \"offline\" without needing network\r\nconnectivity (ex: start keylogger, add persistence, execute custom python script, check_vm, etc.)\r\nMultiple Target Platforms:\r\nPlatform Support Status\r\nWindows XP ~~ Supported ~~ python dropped support\r\nWindows 7 ~~ Supported ~~ python dropped support\r\nWindows 8 Supported\r\nWindows 10 Supported\r\nLinux Supported\r\nMac OSX Limited Support\r\nhttps://github.com/n1nj4sec/pupy\r\nPage 3 of 5\n\nPlatform Support Status\r\nAndroid Limited Support\r\nDocumentation\r\nAll documentation can be found on the wiki.\r\nRefer to the wiki\r\nFAQ\r\nDoes the server work on windows?\r\nPupy has not been tested on Windows. Theoretically, it should work on any platform that supports Docker and\r\nDocker Compose. However, you will need to adapt the Docker Compose installation instructions for the Windows\r\nplatform.\r\nI can't install Pupy. The installation fails.\r\n1. Please refer to the wiki. It is possible that your answer is there.\r\n2. Search the Github issues and see if your issue was already solved.\r\n3. If you issue was not solved, open a new issue following the issue guidelines.\r\nIf you do not follow these steps, you issue will be closed.\r\nAndroid and/or Mac OSX payloads and modules don't work.\r\nPupy has limited support for Android and OSX. These platforms may not be well maintained and may break\r\nintermittently. Some modules (i.e. keylogger) may be missing for these platforms.\r\nDevelopment\r\nIf some of you want to participate to pupy development, don't hesitate! All help is greatly appreciated and all pull\r\nrequests will be reviewed.\r\nAlso there is small note about development. Please run flake8 before doing any commits. File with config is here.\r\nContact\r\nPlatform Contact Info\r\nEmail contact@n1nj4.eu\r\nTwitter https://twitter.com/n1nj4sec\r\nThis project is a personal development, please respect its philosophy and don't use it for evil purposes!\r\nhttps://github.com/n1nj4sec/pupy\r\nPage 4 of 5\n\nSpecial thanks\r\nSpecial thanks to all contributors \u0026 supporters that help improve pupy and make it a better tool! :)\r\nSource: https://github.com/n1nj4sec/pupy\r\nhttps://github.com/n1nj4sec/pupy\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"ETDA",
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/n1nj4sec/pupy"
	],
	"report_names": [
		"pupy"
	],
	"threat_actors": [],
	"ts_created_at": 1775434582,
	"ts_updated_at": 1775960460,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/485364e4a9e693f2f77fae32baff8cde0d2854e9.pdf",
		"text": "https://archive.orkl.eu/485364e4a9e693f2f77fae32baff8cde0d2854e9.txt",
		"img": "https://archive.orkl.eu/485364e4a9e693f2f77fae32baff8cde0d2854e9.jpg"
	}
}