Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

Project Activity

See All Activity >

Categories

Security

License

GNU General Public License version 2.0 (GPLv2)

Follow Rootkit Hunter

Rootkit Hunter Web Site

You Might Also Like
Red Hat Enterprise Linux on Microsoft Azure Icon
Red Hat Enterprise Linux on Microsoft Azure

Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Learn More
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
9
0
0
0
3
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5

User Reviews

  • THE PRODUCT HAS BEEN ABANDONED SINCE 2018 While it may still "work" is it trustworthy, effective, accurate?
  • I'm giving this a 1 star due to it has not been updated since 2018 and giving false positives. If someone picks it up and fixes it I will give it 5 stars since it is a great tool and I would have supported it.
  • This project and many like them have made me enjoy computers even more! Thank you to the developers!! :)
  • Honestly, I've struggled for months what to rate this. Normally, I would have given rkhunter five stars, I'm using it on all my linux machines that have any kind of connection to the internet, and until recently I've been pretty happy with it, but I've started to run more and more things in containers, and rkhunter simply does not handle that at all. Every single process that is inside a container is flagged as "possible rootkit" and similar, possibly because the processes are running with UIDs that don't actually exist on the host system, and I see tons of issues filed with rkhunter where other people have the same problem, but none of them even just get acknowledged by the developers. In actual fact, the commit history (or rather, the timestamps on the last few commits) lead me to believe that rkhunter has been abandoned by its developers. Hence, only one star.
  • Very useful
Read more reviews >

Additional Project Details

Operating Systems

Linux, BSD

Programming Language

Unix Shell, Perl

Related Categories

Unix Shell Security Software, Perl Security Software

Registered

2005-12-14