Showing 17 open source projects for "rootkit"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Wazuh

    Wazuh

    The Open Source Security Platform

    Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container, and endpoint environments. It provides comprehensive threat prevention, detection, integrity monitoring, incident response, and compliance monitoring. SIEM functionality to monitor security across endpoints, workloads, and containers. Centralized architecture enabling scalable deployment and unified management. Easy deployment with...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 2
    Cyrethium

    Cyrethium

    Cyrethium GNU/Linux Debian Based Privacy and Security Focused OS

    This project is no longer maintained. Using it may be unsafe due to outdated kernel/packages !!!! Cyrethium is a Debian-based Linux distribution focused on privacy and security. It can route all incoming and outgoing internet traffic through the Tor network. DNSCrypt-Proxy and I2P Router are pre-configured. It provides strong protection against browser attacks with custom hardened Firefox variants. The distribution hosts a wide range of tools designed from scratch for Cyrethium and...
    Leader badge
    Downloads: 133 This Week
    Last Update:
    See Project
  • 3
    Securonis has been discontinued, a new distro renamed to Cyrethium. Please follow https://cyrethium.org for more details
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Spybot Search and Destroy

    Spybot Search and Destroy

    Protect your computer against malware

    Spybot - Search & Destroy is an anti-spyware and privacy protection tool that has been providing quality security solutions since the early 2000's. Spybot S&D provides complete anti-malware and anti-spyware protection as the System Scan aims to detect and remove all kinds of threats from your Windows PC. These include Adware, Spyware, Trojans and many more. Spybot's Immunization feature keeps you safe online by preventing access to malicious sites and blocks tracking cookies. Spybots...
    Downloads: 43 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.
    Leader badge
    Downloads: 419 This Week
    Last Update:
    See Project
  • 6
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    ...Fixes: registry editing has been disabled by administrator Task Manger has been disabled by your administrator Windows defender is turned off by group policy proxy settings hijack virus (unable to connect proxy server) unable to install antivirus and antivirus killer windows firewall disabled action center or security center disabled. safe mode hijacked and disabled remove fake or rogue antivirus/anti spyware Unknown viruses and worms +more Coming soon: Anti Rootkit Anti Adware (improved) Stealth Process Viewer
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    Reveal RootKit

    Reveal Rootkit detects processes hidden by rootkits on POSIX systems.

    Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose output as long as nothing was found. It's fast and shouldn't produce false positives. Reveal RootKit is tested mainly on Linux but should work on other POSIX systems with a /proc filesystem, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    InternetExploiter
    InternetExploiter Project download is interrupted, there will be more Features like : -encryption -token stealing -Webcam stream -kernel and user mode rootkit -privilege escalation and much more in the next release . Stay updadet here : https://www.facebook.com/pages/InternetExploiter/603567019785590?skip_nax_wizard=true&ref_type=logout_gear Exploit Windows PC´s fast and easy with an integradted Backdoor wich allows you to upload and download Files thrue a Command Line Prompt. This Project is actively developed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 10
    安全狗,您的服务器安全专家,提供包括服务器安全狗、网站安全狗、安全狗云中心等一系列面向服务器及网站安全的软件和平台 服务器安全狗Linux版V2.4版(2.4.08649) (2014-06-09) 1、新增安全扫描功能:包括8大扫描模块:系统命令校验、隐藏进程扫描、隐藏端口扫描、系统账户扫描、启动文件扫描、知名rootkit扫描、网页木马扫描、可疑文件扫描。 2、新增加入服云功能 3、新增FTP登录破解防御功能 4、新增远程异地登录提醒功能 5、开放支持命令行设置服务器狗功能 安装说明:http://bbs.itzmx.com/thread-6595-1-1.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    ...For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your own Secure Encoder. Thus, you can avoid the lost. It's because your account is still protected even your username and password are stolen by the hacker. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Hijack linux system calls rootkit

    Hijack linux system calls

    Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one. Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    X-Sniffing makes you able to check your system for rootkit activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An open source simple flexible RPC system service useful for clusters. Targeted towards small private Windows NT/XP based clusters. Essentially a rootkit that uses AES256 to restrict access and allow users to execute arbitrary code remotely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Data Loss Prevention Tool (based on rootkit methods)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    yarr

    Yet Another Repetitive Rootkit

    Yet another Repetitive Rootkit. It will be design with stealthing in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB