This script is for Slackware 13.37 and may be outdated.

SlackBuilds Repository

13.37 > System > unhide (20110113)

Unhide is a forensic tool to find processes and TCP/UCP ports hidden by 
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.

NOTES: The SlackBuild script builds only unhide-tcp and unhide-linux26.
The original unhide for 2.4 kernels is not built for obvious reasons.
unhide-linux26 has been linked to "unhide", as many apps (rkhunter, for
example) expect to find it here. This is also the solution chosen by many

Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.

Maintained by: Black Rider
Keywords: rootkits,security,process
ChangeLog: unhide


Source Downloads:
unhide-20110113.tgz (0dff8ee5029615f1f81db96dcf6758f7)

Download SlackBuild:
unhide.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:

Validated for Slackware 13.37

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2018 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications