/antipwny

A host based IDS written in C# Targetted at Metasploit

Primary LanguageC#GNU General Public License v2.0GPL-2.0

antipwny

Authors: Rohan Vazarkar, David Bitner

A host based IDS/IPS written in C#, targeted at Metasploit Payloads.

Instructions

AntiPwny requires .NET Framework 4.5, which can be acquired here. An offline installer is available [here] (http://www.microsoft.com/en-us/download/details.aspx?id=40779)

Pre-compiled binaries can be found in the exe folder in the root directory. Make sure you use the proper platform or you will get errors! The DLL file included is necessary for AntiPwny to run.

AntiPwny was compiled using Visual Studio 2012 Professional. To compile it yourself, check out the source and compile it against your target platform.

Current Features

  • Scans Registry for Meterpreter Persistence/MetSvc
  • Active Memory Scans to detect Meterpreter
  • IDS/IPS Mode
  • View outbound connections in compromised processes
  • Self-Detection for Migrated Meterpreter

Detected Payloads:

  • Meterpreter
  • Java Meterpreter
  • Reverse Shell

Planned Features

  • Firewall Support
  • Detect Cobalt Strike Beacon
  • Network Firewall Support
  • Fix configuration tab to actually work

The ObjectListView library was used to create AntiPwny. It can be found [here] (http://objectlistview.sourceforge.net/cs/index.html)