Magentron / chkrootkitLinks
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆236Updated 2 years ago
Alternatives and similar repositories for chkrootkit
Users that are interested in chkrootkit are comparing it to the libraries listed below
Sorting:
- Stable version of Unhide☆166Updated 5 months ago
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Rootkit Hunter install script☆138Updated 11 years ago
- Kernel-Mode Rootkit Hunter☆369Updated 3 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆265Updated last year
- a summary of linux rootkits published on GitHub☆177Updated 5 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆478Updated 2 weeks ago
- linux rootkit adapted for 2.6 and 3.x☆211Updated 9 years ago
- Documentation and specifications☆196Updated 4 months ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆469Updated 8 years ago
- Open Source Network Forensic Analysis Tool (NFAT)☆191Updated 4 years ago
- The tool for updating your Suricata rules.☆271Updated last month
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆595Updated 4 years ago
- Volatility profiles for Linux and Mac OS X☆324Updated 2 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆434Updated 3 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆434Updated 5 years ago
- Attack Detection☆1,358Updated 2 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆401Updated last year
- Volatility plugins developed and maintained by the community☆362Updated 4 years ago
- Copy: Linux process monitoring (exec, fork, exit, set*uid, set*gid)☆31Updated 3 years ago
- Security tools☆104Updated 8 years ago
- Linux Kernel Runtime Guard☆455Updated last week
- ☆54Updated 11 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- Vault Exploit Defense☆125Updated 8 months ago
- Linux audit userspace repository☆651Updated this week
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆275Updated last year
- The IKE Scanner☆380Updated 8 months ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago