Showing 15 open source projects for "rootkit"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 1
    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.
    Leader badge
    Downloads: 457 This Week
    Last Update:
    See Project
  • 2
    Spybot Search and Destroy

    Spybot Search and Destroy

    Protect your computer against malware

    Spybot - Search & Destroy is an anti-spyware and privacy protection tool that has been providing quality security solutions since the early 2000's. Spybot S&D provides complete anti-malware and anti-spyware protection as the System Scan aims to detect and remove all kinds of threats from your Windows PC. These include Adware, Spyware, Trojans and many more. Spybot's Immunization feature keeps you safe online by preventing access to malicious sites and blocks tracking cookies. Spybots...
    Downloads: 22 This Week
    Last Update:
    See Project
  • 3
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    Reveal RootKit

    Reveal Rootkit detects processes hidden by rootkits on POSIX systems.

    Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose output as long as nothing was found. It's fast and shouldn't produce false positives. Reveal RootKit is tested mainly on Linux but should work on other POSIX systems with a /proc filesystem, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Speech-to-Text: Automatic Speech Recognition Icon
    Speech-to-Text: Automatic Speech Recognition

    Accurately convert voice to text in over 125 languages and variants by applying Google's powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
  • 5
    Dont Hijack This

    Dont Hijack This

    DHT is an anti-hacker tool to fix all the damage caused by viruses.

    ... action center or security center disabled. safe mode hijacked and disabled remove fake or rogue antivirus/anti spyware Unknown viruses and worms +more Coming soon: Anti Rootkit Anti Adware (improved) Stealth Process Viewer
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    InternetExploiter
    InternetExploiter Project download is interrupted, there will be more Features like : -encryption -token stealing -Webcam stream -kernel and user mode rootkit -privilege escalation and much more in the next release . Stay updadet here : https://www.facebook.com/pages/InternetExploiter/603567019785590?skip_nax_wizard=true&ref_type=logout_gear Exploit Windows PC´s fast and easy with an integradted Backdoor wich allows you to upload and download Files thrue a Command Line Prompt. This Project...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    安全狗,您的服务器安全专家,提供包括服务器安全狗、网站安全狗、安全狗云中心等一系列面向服务器及网站安全的软件和平台 服务器安全狗Linux版V2.4版(2.4.08649) (2014-06-09) 1、新增安全扫描功能:包括8大扫描模块:系统命令校验、隐藏进程扫描、隐藏端口扫描、系统账户扫描、启动文件扫描、知名rootkit扫描、网页木马扫描、可疑文件扫描。 2、新增加入服云功能 3、新增FTP登录破解防御功能 4、新增远程异地登录提醒功能 5、开放支持命令行设置服务器狗功能 安装说明:http://bbs.itzmx.com/thread-6595-1-1.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Hijack linux system calls rootkit

    Hijack linux system calls

    Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one. Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    OpenSE(Open Secure Encoder)

    OpenSE(Open Secure Encoder)

    OpenSE - Secure your online transactions today!!

    Secure Encoder is a digital secure channel which provides a way to identify yourself. For instance, you can log to your email account by filling the username and password. But, is it safety? Your email account can be stolen by the hackers. Your computer's may suffer from the virus, trojan, key logger, rootkit or phishing attack, and all of your email contents are exposed. For which applications support the Secure Encoder, you are required to input the pin number which generates from your...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
  • 10
    X-Sniffing makes you able to check your system for rootkit activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    An open source simple flexible RPC system service useful for clusters. Targeted towards small private Windows NT/XP based clusters. Essentially a rootkit that uses AES256 to restrict access and allow users to execute arbitrary code remotely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Data Loss Prevention Tool (based on rootkit methods)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    yarr

    Yet Another Repetitive Rootkit

    Yet another Repetitive Rootkit. It will be design with stealthing in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    LSE employs a "white list" approach to allow/disallow program execution on your computer. It's an easy way to prevent user running applications which can be malicious [virus, backdoor, rootkit, ...] or simply unwanted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next