Skip to content

PupyC2 - Detect

ID: pupyc2

Severity: info

Author: pussycat0x

Tags: c2,ir,osint,pupyc2,panel

Pupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.

id: pupyc2
info:
name: PupyC2 - Detect
author: pussycat0x
severity: info
description: |
Pupy is a cross-platform, multi function RAT and post-exploitation tool mainly written in python. It features an all-in-memory execution guideline and leaves a very low footprint. Pupy can communicate using multiple transports, migrate into processes using reflective injection, and load remote python code, python packages and python C-extensions from memory.
reference:
- https://twitter.com/TLP_R3D/status/1654038602282565632
- https://github.com/n1nj4sec/pupy
metadata:
verified: true
max-request: 1
shodan-query: aa3939fc357723135870d5036b12a67097b03309
tags: c2,ir,osint,pupyc2,panel
http:
- method: GET
path:
- '{{BaseURL}}'
matchers-condition: and
matchers:
- type: word
part: header
words:
- 'Etag: "aa3939fc357723135870d5036b12a67097b03309"'
- type: status
status:
- 200
# digest: 490a0046304402205c14735ee73c30be7895e86c5fb33143a5d3270efc12861f37678f0159a2c2b302205759a3484730d53a311cdc059adc66d0dbc7e4e4b431a519faa00e083526abd7:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/c2/pupyc2.yaml"

View on Github