hollows_hunter VS Pentest-Notes

Compare hollows_hunter vs Pentest-Notes and see what are their differences.

hollows_hunter

Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches). (by hasherezade)

Pentest-Notes

Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec) (by SofianeHamlaoui)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
hollows_hunter Pentest-Notes
4 1
1,877 329
- -
8.3 1.8
29 days ago over 1 year ago
C XSLT
BSD 2-clause "Simplified" License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

hollows_hunter

Posts with mentions or reviews of hollows_hunter. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-21.

Pentest-Notes

Posts with mentions or reviews of Pentest-Notes. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-21.

What are some alternatives?

When comparing hollows_hunter and Pentest-Notes you can also consider the following projects:

mal_unpack - Dynamic unpacker based on PE-sieve

mageni - Open-source vulnerability scanner

pe-sieve - Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

jwtXploiter - A tool to test security of json web token

radare2 - UNIX-like reverse engineering framework and command-line toolset [Moved to: https://github.com/radareorg/radare2]

dradis-ce - Dradis Framework: Collaboration and reporting for IT Security teams

hem-hashes - Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block

Villain - Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

favirecon - Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.

WhatWeb - Next generation web scanner

Reconnoitre - A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

faction - Pen Test Report Generation and Assessment Collaboration