This script is for Slackware 14.1 only and may be outdated.

SlackBuilds Repository

14.1 > System > unhide (20121229)

Unhide is a forensic tool to find processes and TCP/UCP ports hidden by 
rootkits, Linux kernel modules or by other techniques. It includes unhide
and unhide-tcp.

Remember to run unhide as root only. Failing to do so could result in
a massive arrival of false positives.

Maintained by: Black Rider
Keywords: rootkits,security,process
ChangeLog: unhide

Homepage:
http://www.unhide-forensics.info

Source Downloads:
unhide-20121229.tgz (1ad76312ed0ff7a26b8c501af9bffc67)

Download SlackBuild:
unhide.tar.gz
unhide.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
slack-desc
unhide.SlackBuild
unhide.info

Validated for Slackware 14.1

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds