Showing 13 open source projects for "rootkits"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Powerful App Monitoring Without Surprise Bills Icon
    Powerful App Monitoring Without Surprise Bills

    AppSignal starts at $23/month with all features included. No overages, no hidden fees. 30-day free trial.

    Tired of monitoring tools that punish you for scaling? AppSignal offers transparent, predictable pricing with every feature unlocked on every plan. Track errors, monitor performance, detect anomalies, and manage logs across Ruby, Python, Node.js, and more. Trusted by developers since 2012 with free dev-to-dev support. No credit card required to start your 30-day trial.
    Try AppSignal Free
  • 1
    Volatility

    Volatility

    An advanced memory forensics framework

    ...It enables investigators and malware analysts to extract process lists, network connections, DLLs, strings, artifacts, and more. Volatility supports many plugins for detecting hidden processes, malware, rootkits, and event tracing. It’s essential in digital forensics and incident response workflows.
    Downloads: 122 This Week
    Last Update:
    See Project
  • 2
    PKT Cash GUI Miner

    PKT Cash GUI Miner

    PKT Cash mining tool. Monetize unused internet bandwidth.

    PKT incentives people to operate, connect and maintain network infrastructure around the world. This is accomplished by mining the PacketCrypt proof of work, the world's first and only bandwidth-hard layer 1 protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Unhide is a forensic tool to find processes and TCP/UDP ports hidden by rootkits / LKMs or by another hiding technique. Note 1: Unhide-linux repo has migrated to https://github.com/YJesus/Unhide Please, report bugs or make pull requests on the new repo. Note 2: unhide-windows is no more maintained. Use tools like Gmer http://www.gmer.net/
    Downloads: 12 This Week
    Last Update:
    See Project
  • 4
    Rekall

    Rekall

    Rekall Memory Forensic Framework

    Rekall is a powerful memory forensics framework that turns raw RAM captures—or live system state—into structured artifacts investigators can query and script. It ships with a large collection of plugins that parse OS internals to recover processes, modules, sockets, registry hives, and file objects, even when rootkits try to hide them. The design emphasizes repeatability: investigators run well-defined analyses that produce timelines, indicators, and reports suitable for case work or automation. Rekall supports profile-free operation for many targets, reducing setup friction and making it easier to handle varied images in the field. Extensibility is a core theme, with a plugin API and notebook-friendly workflows for custom hunts and triage. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5

    Reveal RootKit

    Reveal Rootkit detects processes hidden by rootkits on POSIX systems.

    Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose output as long as nothing was found. It's fast and shouldn't produce false positives. Reveal RootKit is tested mainly on Linux but should work on other POSIX systems with a /proc filesystem, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Trojan Scan is a simple shell script that allows for simple but relatively effective checking for trojans, rootkits and other malware that may be using your server and network for unwanted (and possibly illegal) purposes. Since this script is relatively simple don't expect it to catch them all, but it helps to find these programs on e.g. shared servers. On those machines lots of users install many kinds of applications. These applications may introduce new vulnerabilities which would perhaps otherwise not be detected if not for a very alert sysadmin. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    aLinux v15.0
    Inspiring Operating System replaces Windows 8, Vista, XP and Mac OS X. (Are you tired of nasty viruses, worms, trojans, rootkits, dialers, spyware, and malware?). If so, make a smart move and get a newbie friendly free Linux Operating System today!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Moon Secure Antivirus

    Moon Secure Antivirus

    Free - Simple - Scalable

    Moon Secure Antivirus aims to be the best Free Antivirus for Windows under GPL license. It offers multiple scan engines, Net shield, Firewall, On access, on Exec scanner and rootkits preventions plus features from Commercial Antivirus applications. Also visit TWERT, our sister project, allowing scheduled domain and process blocking with Windows, Linux, OSX installers at https://sourceforge.net/projects/twert/
    Leader badge
    Downloads: 47 This Week
    Last Update:
    See Project
  • 9
    Open source antivirus developed in C++. Detects and eliminates viruses, trojans, worms, adware, spyware, rootkits, also protects against phising attempts and network attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 10
    Zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Nasty LKM Defender is a module wich protects Your system against some nasty modules (e.g. rootkits). Well mainly it protects sys_call_table and some other important functions (get_module_list, sys_query_module)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    An Host-Based Intrusion detection system (for Unix) with modules in C and perl. It locally checks for signs of trojans, worms, rootkits, miss-configurations and other system problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB