Skip to content

rvazarkar/antipwny

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

antipwny

Authors: Rohan Vazarkar, David Bitner

A host based IDS/IPS written in C#, targeted at Metasploit Payloads.

Instructions

AntiPwny requires .NET Framework 4.5, which can be acquired here. An offline installer is available [here] (http://www.microsoft.com/en-us/download/details.aspx?id=40779)

Pre-compiled binaries can be found in the exe folder in the root directory. Make sure you use the proper platform or you will get errors! The DLL file included is necessary for AntiPwny to run.

AntiPwny was compiled using Visual Studio 2012 Professional. To compile it yourself, check out the source and compile it against your target platform.

Current Features

  • Scans Registry for Meterpreter Persistence/MetSvc
  • Active Memory Scans to detect Meterpreter
  • IDS/IPS Mode
  • View outbound connections in compromised processes
  • Self-Detection for Migrated Meterpreter

Detected Payloads:

  • Meterpreter
  • Java Meterpreter
  • Reverse Shell

Planned Features

  • Firewall Support
  • Detect Cobalt Strike Beacon
  • Network Firewall Support
  • Fix configuration tab to actually work

The ObjectListView library was used to create AntiPwny. It can be found [here] (http://objectlistview.sourceforge.net/cs/index.html)

About

A host based IDS written in C# Targetted at Metasploit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages