<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body bgcolor="#FFFFFF" text="#000000">
HDM peeked out from behind his Internet scanning farm earlier today
and posted a tweet about <a
href="https://github.com/n1nj4sec/pupy/tree/master/docs/screenshots">Pupy</a>,
which is an injectable Python you can use for penetration testing
saying that it seemed similar to Meterpreter.<br>
<br>
Last I checked Meterpreter was a big blob of C++ and the Ruby
portions ran client-side, which is pretty different from both Pupy
and INNUENDO.<br>
<br>
Here, as a small example, is the rabbit hole that the Pupy people
are starting to look into: <a class="moz-txt-link-freetext" href="https://github.com/n1nj4sec/pupy/issues/4">https://github.com/n1nj4sec/pupy/issues/4</a><br>
<br>
Another similar effort that does DNS C2 in Python (although as far
as I can tell it goes direct to the DNS server, and not through
whatever DNS server the client is supposed to use normally ?!?) is
here:
<a class="moz-txt-link-freetext" href="http://lockboxx.blogspot.com/2015/01/python-reverse-dns-shell.html">http://lockboxx.blogspot.com/2015/01/python-reverse-dns-shell.html</a><br>
<br>
Even though there's wildly different engineering efforts and goals
for these projects and INNUENDO, if I didn't have access to INNUENDO
I would definitely look into them! (But of course, I do, and YOU
should! <a class="moz-txt-link-abbreviated" href="mailto:sales@immunityinc.com">sales@immunityinc.com</a> for evals. ;)<br>
<br>
-dave<br>
<br>
<br>
<br>
<br>
</body>
</html>