SlackBuilds Repository

14.0 > System > unhide (20110113)

Unhide is a forensic tool to find processes and TCP/UCP ports hidden by
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.

NOTES: The SlackBuild script builds only unhide-tcp and unhide-linux26.
The original unhide for 2.4 kernels is not built for obvious reasons.
unhide-linux26 has been linked to "unhide", as many apps (rkhunter, for
example) expect to find it here. This is also the solution chosen by many
distributions.

Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.

Maintained by: Black Rider
Keywords: rootkits,security,process

Homepage:
http://www.unhide-forensics.info

Source Downloads:
unhide-20110113.tgz (0dff8ee5029615f1f81db96dcf6758f7)

Download SlackBuild:
unhide.tar.gz
unhide.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
slack-desc
unhide.SlackBuild
unhide.info

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

[  Exec: 0.0325 sec  |  Load: 0.01 0.05 0.11  ]

© 2006-2014 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications