Showing 11 open source projects for "rootkit"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Wazuh

    Wazuh

    The Open Source Security Platform

    Wazuh is an open-source, unified security platform that delivers extended detection and response (XDR) and SIEM capabilities for on-premises, cloud, container, and endpoint environments. It provides comprehensive threat prevention, detection, integrity monitoring, incident response, and compliance monitoring. SIEM functionality to monitor security across endpoints, workloads, and containers. Centralized architecture enabling scalable deployment and unified management. Easy deployment with...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 2
    Cyrethium

    Cyrethium

    Cyrethium GNU/Linux Debian Based Privacy and Security Focused OS

    ARCHIVAL NOTICE: Cyrethium Project This project has been long discontinued and is no longer being maintained by the developer. Please note that: Status: This distribution was officially abandoned some time ago. There are no plans for future updates, security patches, or support. Liability Disclaimer: The developer accepts no responsibility for any damages, security vulnerabilities, or data loss resulting from the use of this outdated software. Use it strictly at your own...
    Leader badge
    Downloads: 98 This Week
    Last Update:
    See Project
  • 3
    Securonis has been discontinued, a new distro renamed to Cyrethium. Please follow https://cyrethium.org for more details
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.
    Leader badge
    Downloads: 341 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    HiddenWall

    HiddenWall

    hidden firewall, custom firewall in kernel

    HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that block external access, because have a hook to netfilter on kernel land(think like a second layer for firewall). My beginning purpose at this project is protect my personal server, now is protect the machines of my friends. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Reveal RootKit

    Reveal Rootkit detects processes hidden by rootkits on POSIX systems.

    Reveal Rootkit detects processes hidden by rootkits. It is intended to run out of cron or similar services on a regular base and avoids verbose output as long as nothing was found. It's fast and shouldn't produce false positives. Reveal RootKit is tested mainly on Linux but should work on other POSIX systems with a /proc filesystem, too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Hijack linux system calls rootkit

    Hijack linux system calls

    Hijack the linux system calls, for example when the open system call is called, the new hijacked system call is called instead of the original one. Please see: http://se7so.blogspot.com/2012/07/hijacking-linux-system-calls-rootkit.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    X-Sniffing makes you able to check your system for rootkit activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An open source simple flexible RPC system service useful for clusters. Targeted towards small private Windows NT/XP based clusters. Essentially a rootkit that uses AES256 to restrict access and allow users to execute arbitrary code remotely.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    checkps is a program to detect rootkits by detecting falsified output and similar anolomies. The ps check should work on anything with /proc, the (currently incomplete) netstat check is more linux specific
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    yarr

    Yet Another Repetitive Rootkit

    Yet another Repetitive Rootkit. It will be design with stealthing in mind.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB