Hande-Stealer VS DeathSleep

Compare Hande-Stealer vs DeathSleep and see what are their differences.

DeathSleep

A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementing page protection changes during no execution. (by janoglezcampos)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
Hande-Stealer DeathSleep
2 1
92 479
- -
0.0 0.0
about 1 year ago almost 2 years ago
Python Python
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Hande-Stealer

Posts with mentions or reviews of Hande-Stealer. We have used some of these posts to build our list of alternatives and similar projects.

DeathSleep

Posts with mentions or reviews of DeathSleep. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-08-01.

What are some alternatives?

When comparing Hande-Stealer and DeathSleep you can also consider the following projects:

Veil - Veil 3.1.X (Check version info in Veil at runtime)

Bashfuscator - A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.

Powershell-RAT - Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.

injection - Windows process injection methods

Tsunami-Fi - Tsunami-Fi is simple multi-tool bash application for Wi-Fi attacks

color-stealing - Adding color to binary fractals by stealing it

URL-obfuscator - Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.

mimiRust - MimiRust - Hacking the Windows operating system to hand us the keys to the kingdom with Rust.

PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF

ScareCrow-CobaltStrike - Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)

adversarial-robustness-toolbox - Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams