SlackBuilds Repository

14.1 > System > unhide (20121229)

Unhide is a forensic tool to find processes and TCP/UCP ports hidden by
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.

Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.

Maintained by: Black Rider
Keywords: rootkits,security,process

Homepage:
http://www.unhide-forensics.info

Source Downloads:
unhide-20121229.tgz (1ad76312ed0ff7a26b8c501af9bffc67)

Download SlackBuild:
unhide.tar.gz
unhide.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
slack-desc
unhide.SlackBuild
unhide.info

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

[  Exec: 0.0303 sec  |  Load: 0.30 0.24 0.28  ]

© 2006-2014 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications