Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

Project Activity

See All Activity >

Categories

Security

License

GNU General Public License version 2.0 (GPLv2)

Follow Rootkit Hunter

Rootkit Hunter Web Site

Other Useful Business Software
Secure User Management, Made Simple | Frontegg Icon
Secure User Management, Made Simple | Frontegg

Get 7,500 MAUs, 50 tenants, and 5 SSOs free – integrated into your app with just a few lines of code.

Frontegg powers modern businesses with a user management platform that’s fast to deploy and built to scale. Embed SSO, multi-tenancy, and a customer-facing admin portal using robust SDKs and APIs – no complex setup required. Designed for the Product-Led Growth era, it simplifies setup, secures your users, and frees your team to innovate. From startups to enterprises, Frontegg delivers enterprise-grade tools at zero cost to start. Kick off today.
Start for Free
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
9
0
0
0
3
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5

User Reviews

  • THE PRODUCT HAS BEEN ABANDONED SINCE 2018 While it may still "work" is it trustworthy, effective, accurate?
  • I'm giving this a 1 star due to it has not been updated since 2018 and giving false positives. If someone picks it up and fixes it I will give it 5 stars since it is a great tool and I would have supported it.
  • This project and many like them have made me enjoy computers even more! Thank you to the developers!! :)
  • Honestly, I've struggled for months what to rate this. Normally, I would have given rkhunter five stars, I'm using it on all my linux machines that have any kind of connection to the internet, and until recently I've been pretty happy with it, but I've started to run more and more things in containers, and rkhunter simply does not handle that at all. Every single process that is inside a container is flagged as "possible rootkit" and similar, possibly because the processes are running with UIDs that don't actually exist on the host system, and I see tons of issues filed with rkhunter where other people have the same problem, but none of them even just get acknowledged by the developers. In actual fact, the commit history (or rather, the timestamps on the last few commits) lead me to believe that rkhunter has been abandoned by its developers. Hence, only one star.
  • Very useful
Read more reviews >

Additional Project Details

Operating Systems

BSD, Linux

Programming Language

Perl, Unix Shell

Related Categories

Unix Shell Security Software, Perl Security Software

Registered

2005-12-14