<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    HDM peeked out from behind his Internet scanning farm earlier today
    and posted a tweet about <a
      href="https://github.com/n1nj4sec/pupy/tree/master/docs/screenshots">Pupy</a>,
    which is an injectable Python you can use for penetration testing
    saying that it seemed similar to Meterpreter.<br>
    <br>
    Last I checked Meterpreter was a big blob of C++ and the Ruby
    portions ran client-side, which is pretty different from both Pupy
    and INNUENDO.<br>
    <br>
    Here, as a small example, is the rabbit hole that the Pupy people
    are starting to look into: <a class="moz-txt-link-freetext" href="https://github.com/n1nj4sec/pupy/issues/4">https://github.com/n1nj4sec/pupy/issues/4</a><br>
    <br>
    Another similar effort that does DNS C2 in Python (although as far
    as I can tell it goes direct to the DNS server, and not through
    whatever DNS server the client is supposed to use normally ?!?) is
    here:
    <a class="moz-txt-link-freetext" href="http://lockboxx.blogspot.com/2015/01/python-reverse-dns-shell.html">http://lockboxx.blogspot.com/2015/01/python-reverse-dns-shell.html</a><br>
    <br>
    Even though there's wildly different engineering efforts and goals
    for these projects and INNUENDO, if I didn't have access to INNUENDO
    I would definitely look into them! (But of course, I do, and YOU
    should! <a class="moz-txt-link-abbreviated" href="mailto:sales@immunityinc.com">sales@immunityinc.com</a> for evals. ;)<br>
    <br>
    -dave<br>
    <br>
    <br>
    <br>
    <br>
  </body>
</html>