This script is for Slackware 13.37 only and may be outdated.

SlackBuilds Repository

13.37 > System > unhide (20110113)

Unhide is a forensic tool to find processes and TCP/UCP ports hidden by 
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.

NOTES: The SlackBuild script builds only unhide-tcp and unhide-linux26.
The original unhide for 2.4 kernels is not built for obvious reasons.
unhide-linux26 has been linked to "unhide", as many apps (rkhunter, for
example) expect to find it here. This is also the solution chosen by many
distributions.

Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.

Maintained by: Black Rider
Keywords: rootkits,security,process
ChangeLog: unhide

Homepage:
http://www.unhide-forensics.info

Source Downloads:
unhide-20110113.tgz (0dff8ee5029615f1f81db96dcf6758f7)

Download SlackBuild:
unhide.tar.gz
unhide.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
slack-desc
unhide.SlackBuild
unhide.info

Validated for Slackware 13.37

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds