[go: up one dir, main page]

Showing 18 open source projects for "rootkit"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • All-in-one solution to control corporate spending Icon
    All-in-one solution to control corporate spending

    Issuance in seconds. Full spending control. Perfect for media buying.

    Wallester Business is a leading world-class solution to optimize your company’s financial processes! Issuing virtual and physical corporate expense cards with an IBAN account, expense monitoring, limit regulation, convenient accounting, subscription control — manage your finance on all-in-one platform in real time! Wallester Business benefits your business growth!
    Learn More
  • 1
    Wazuh

    Wazuh

    The Open Source Security Platform

    Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container, and endpoint environments. It provides comprehensive threat prevention, detection, integrity monitoring, incident response, and compliance monitoring. SIEM functionality to monitor security across endpoints, workloads, and containers. Centralized architecture enabling scalable deployment and unified management. Easy deployment with...
    Downloads: 38 This Week
    Last Update:
    See Project
  • 2
    Cyrethium

    Cyrethium

    Cyrethium GNU/Linux Debian Based Privacy and Security Focused OS

    This project is no longer maintained. Using it may be unsafe due to outdated kernel/packages !!!! Cyrethium is a Debian-based Linux distribution focused on privacy and security. It can route all incoming and outgoing internet traffic through the Tor network. DNSCrypt-Proxy and I2P Router are pre-configured. It provides strong protection against browser attacks with custom hardened Firefox variants. The distribution hosts a wide range of tools designed from scratch for Cyrethium and...
    Leader badge">
    Downloads: 143 This Week
    Last Update:
    See Project
  • 3
    Securonis has been discontinued, a new distro renamed to Cyrethium. Please follow https://cyrethium.org for more details
    Leader badge">
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Full Stack Computer Scanner

    Full Stack Computer Scanner

    Scans the entire computer device "stack" (hardware, software, comms)

    The FULL STACK COMPUTER SCANNER is a proprietary FREEWARE Windows system diagnostics tool designed to help users assess a computer’s overall security posture. The application performs read-only analysis across 50 system sectors, including hardware, firmware, boot, OS configuration, software, files, browser extensions, and network-related indicators. The scanner does not remove, block, quarantine, or modify anything. This is the initial 2026 public release of a transparency-first...
    Downloads: 58 This Week
    Last Update:
    See Project
  • The Easy Way To Build A Referral Program Icon
    The Easy Way To Build A Referral Program

    Referral Factory is the #1 referral software used by SMEs and Marketers.

    Referral Factory offers over 1000 pre-built referral program templates you can use as your own, or you can build your own referral program from scratch. You get unlimited referral campaigns on all plans, and brilliant support from their team of referral marketing experts.
    Learn More
  • 5
    Spybot Search and Destroy

    Spybot Search and Destroy

    Protect your computer against malware

    Spybot - Search & Destroy is an anti-spyware and privacy protection tool that has been providing quality security solutions since the early 2000's. Spybot S&D provides complete anti-malware and anti-spyware protection as the System Scan aims to detect and remove all kinds of threats from your Windows PC. These include Adware, Spyware, Trojans and many more. Spybot's Immunization feature keeps you safe online by preventing access to malicious sites and blocks tracking cookies. Spybots...
    Downloads: 47 This Week
    Last Update:
    See Project
  • 6
    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.
    Leader badge">
    Downloads: 356 This Week
    Last Update:
    See Project
  • 7
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    ...Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall disabled action center or security center disabled. safe mode hijacked and disabled remove fake or rogue antivirus/anti spyware Unknown viruses and worms +more Coming soon: Anti Rootkit Anti Adware (improved) Stealth Process Viewer
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9

    Reveal RootKit

    Reveal Rootkit detects processes hidden by rootkits on POSIX systems.

    Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose output as long as nothing was found. It's fast and shouldn't produce false positives. Reveal RootKit is tested mainly on Linux but should work on other POSIX systems with a /proc filesystem, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Get to know our award-winning HR software. Icon
    Get to know our award-winning HR software.

    HR software with heart.

    BambooHR is all-in-one HR software made for small and medium businesses and the people who work in them—like you. Our software makes it easy to collect, maintain, and analyze your people data, improve the way you hire talent, onboard new employees, manage compensation, and develop your company culture. It’s designed to set you free to focus on what matters most—your people.
    Try it Free
  • 10
    InternetExploiter
    InternetExploiter Project download is interrupted, there will be more Features like : -encryption -token stealing -Webcam stream -kernel and user mode rootkit -privilege escalation and much more in the next release . Stay updadet here : https://www.facebook.com/pages/InternetExploiter/603567019785590?skip_nax_wizard=true&ref_type=logout_gear Exploit Windows PC´s fast and easy with an integradted Backdoor wich allows you to upload and download Files thrue a Command Line Prompt. This Project is actively developed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    安全狗,您的服务器安全专家,提供包括服务器安全狗、网站安全狗、安全狗云中心等一系列面向服务器及网站安全的软件和平台 服务器安全狗Linux版V2.4版(2.4.08649) (2014-06-09) 1、新增安全扫描功能:包括8大扫描模块:系统命令校验、隐藏进程扫描、隐藏端口扫描、系统账户扫描、启动文件扫描、知名rootkit扫描、网页木马扫描、可疑文件扫描。 2、新增加入服云功能 3、新增FTP登录破解防御功能 4、新增远程异地登录提醒功能 5、开放支持命令行设置服务器狗功能 安装说明:http://bbs.itzmx.com/thread-6595-1-1.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    ...For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your own Secure Encoder. Thus, you can avoid the lost. It's because your account is still protected even your username and password are stolen by the hacker. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Hijack linux system calls rootkit

    Hijack linux system calls

    Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one. Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    X-Sniffing makes you able to check your system for rootkit activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An open source simple flexible RPC system service useful for clusters. Targeted towards small private Windows NT/XP based clusters. Essentially a rootkit that uses AES256 to restrict access and allow users to execute arbitrary code remotely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Data Loss Prevention Tool (based on rootkit methods)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    yarr

    Yet Another Repetitive Rootkit

    Yet another Repetitive Rootkit. It will be design with stealthing in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next