Unhide is a forensic tool to find processes and TCP/UCP ports hidden by
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.
NOTES: The SlackBuild script builds only unhide-tcp and unhide-linux26.
The original unhide for 2.4 kernels is not built for obvious reasons.
unhide-linux26 has been linked to "unhide", as many apps (rkhunter, for
example) expect to find it here. This is also the solution chosen by many
distributions.
Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.
Maintained by: Black Rider
Keywords: rootkits,security,process
ChangeLog: unhide
Homepage:
http://www.unhide-forensics.info
Download SlackBuild:
unhide.tar.gz
unhide.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
slack-desc |
unhide.SlackBuild |
unhide.info |
© 2006-2025 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds