Magentron / chkrootkitLinks
This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit
☆245Updated 3 years ago
Alternatives and similar repositories for chkrootkit
Users that are interested in chkrootkit are comparing it to the libraries listed below
Sorting:
- Mirror of https://github.com/zeek/zeek☆176Updated 2 years ago
- Stable version of Unhide☆190Updated 5 months ago
- Kernel-Mode Rootkit Hunter☆376Updated 4 years ago
- linux rootkit adapted for 2.6 and 3.x☆218Updated 10 years ago
- Command-line utility to scan the system and report on potential vulnerabilities, based on public CVE data☆268Updated last month
- virtual honeypots☆391Updated 2 years ago
- Rootkit Hunter install script☆149Updated 12 years ago
- fireELF - Fileless Linux Malware Framework☆678Updated 6 years ago
- repair corrupted pcap files☆230Updated last year
- Open Source Network Forensic Analysis Tool (NFAT)☆199Updated 5 years ago
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆93Updated 6 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆485Updated 9 years ago
- Attack Detection☆1,362Updated 3 years ago
- ☆60Updated last year
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated last year
- Super Next generation Advanced Reactive honEypot☆472Updated last year
- By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.☆604Updated 4 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆435Updated 6 years ago
- HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis an…☆746Updated 2 years ago
- Tiny SHell is an open-source UNIX backdoor.☆706Updated 12 years ago
- The tool for updating your Suricata rules.☆289Updated 2 months ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆512Updated 2 weeks ago
- Peter's Parallel Network Scanner☆133Updated 5 years ago
- ☆481Updated last month
- Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.☆190Updated last year
- An IDS (Couldn't find Snort on github when I wanted to fork)☆122Updated 13 years ago
- Suricata rules for the new critical vulnerabilities☆85Updated 5 years ago
- ssldump - (de-facto repository gathering patches around the cyberspace)☆254Updated this week
- Proof of concept for LD_PRELOAD malware that uses extended attributes to protect files.☆119Updated 9 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago