Magentron / chkrootkitLinks
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆237Updated 2 years ago
Alternatives and similar repositories for chkrootkit
Users that are interested in chkrootkit are comparing it to the libraries listed below
Sorting:
- Rootkit Hunter install script☆140Updated 11 years ago
- Stable version of Unhide☆167Updated 6 months ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- linux rootkit adapted for 2.6 and 3.x☆212Updated 9 years ago
- virtual honeypots☆372Updated 2 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆266Updated last year
- psad: Intrusion Detection and Log Analysis with iptables☆402Updated 2 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆191Updated 4 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆480Updated last month
- The tool for updating your Suricata rules.☆274Updated 2 weeks ago
- ☆54Updated 11 months ago
- Security tools☆104Updated 8 years ago
- GitHub mirror of the Linux Kernel's audit repository☆153Updated last week
- Pulled Pork for Snort and Suricata rule management (from Google code)☆435Updated 3 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆445Updated last month
- Attack Detection☆1,360Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆118Updated 9 years ago
- Web Backdoor Cookie Script-Kit☆185Updated 13 years ago
- Code for my 0x00sec.org posts☆323Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Super Next generation Advanced Reactive honEypot☆465Updated last year
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆459Updated 2 weeks ago
- HTran is a connection bouncer, a kind of proxy server. A “listener” program is hacked stealthily onto an unsuspecting host anywhere on t…☆258Updated 4 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆524Updated 4 years ago
- Dump various types of Windows credentials without injecting in any process.☆425Updated 2 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Updated 5 years ago
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆187Updated last year