Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

Project Activity

See All Activity >

Categories

Security

License

GNU General Public License version 2.0 (GPLv2)

Follow Rootkit Hunter

Rootkit Hunter Web Site

You Might Also Like
Nectar: Employee Recognition Software to Build Great Culture Icon
Nectar: Employee Recognition Software to Build Great Culture

Nectar is an employee recognition software built for the modern workforce.

Our 360 recognition & rewards platform enables everyone (peer to peer & manager to employees alike) to send meaningful recognition rooted in core values. Nectar has the most extensive rewards catalog so users can choose from company branded swag, Amazon products, gift cards or custom reward types. Integrate with your other tools like Slack and Teams to make sending recognition easy. We support top organizations like MLB, SHRM, Redfin, Heineken and more.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
9
0
0
0
3
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5

User Reviews

  • THE PRODUCT HAS BEEN ABANDONED SINCE 2018 While it may still "work" is it trustworthy, effective, accurate?
  • I'm giving this a 1 star due to it has not been updated since 2018 and giving false positives. If someone picks it up and fixes it I will give it 5 stars since it is a great tool and I would have supported it.
  • This project and many like them have made me enjoy computers even more! Thank you to the developers!! :)
  • Honestly, I've struggled for months what to rate this. Normally, I would have given rkhunter five stars, I'm using it on all my linux machines that have any kind of connection to the internet, and until recently I've been pretty happy with it, but I've started to run more and more things in containers, and rkhunter simply does not handle that at all. Every single process that is inside a container is flagged as "possible rootkit" and similar, possibly because the processes are running with UIDs that don't actually exist on the host system, and I see tons of issues filed with rkhunter where other people have the same problem, but none of them even just get acknowledged by the developers. In actual fact, the commit history (or rather, the timestamps on the last few commits) lead me to believe that rkhunter has been abandoned by its developers. Hence, only one star.
  • Very useful
Read more reviews >

Additional Project Details

Operating Systems

Linux, BSD

Programming Language

Unix Shell, Perl

Related Categories

Unix Shell Security Software, Perl Security Software

Registered

2005-12-14