Magentron / chkrootkitLinks
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆240Updated 2 years ago
Alternatives and similar repositories for chkrootkit
Users that are interested in chkrootkit are comparing it to the libraries listed below
Sorting:
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Kernel-Mode Rootkit Hunter☆370Updated 3 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆266Updated last year
- linux rootkit adapted for 2.6 and 3.x☆212Updated 9 years ago
- Stable version of Unhide☆168Updated 7 months ago
- Rootkit Hunter install script☆140Updated 11 years ago
- virtual honeypots☆372Updated 2 years ago
- repair corrupted pcap files☆219Updated last year
- ☆54Updated last year
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆597Updated 4 years ago
- ssldump - (de-facto repository gathering patches around the cyberspace)☆253Updated 3 weeks ago
- Open Source Network Forensic Analysis Tool (NFAT)☆190Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆469Updated 8 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆736Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆118Updated 9 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆403Updated 2 years ago
- Attack Detection☆1,360Updated 2 years ago
- a summary of linux rootkits published on GitHub☆178Updated 5 years ago
- Peter's Parallel Network Scanner☆133Updated 5 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆327Updated 2 years ago
- The tool for updating your Suricata rules.☆276Updated 2 weeks ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆433Updated 5 years ago
- An IDS (Couldn't find Snort on github when I wanted to fork)☆120Updated 13 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆483Updated last month
- ☆482Updated 3 years ago
- Hades is a Host-Based Intrusion Detection System based on eBPF(mainly)☆295Updated 7 months ago
- Copy: Linux process monitoring (exec, fork, exit, set*uid, set*gid)☆31Updated 3 years ago
- Simple linux backdoors and hiding techniques☆212Updated 7 years ago