Rootkit Hunter, security monitoring and analyzing tool for POSIX compliant systems.

Project Activity

See All Activity >

Categories

Security

License

GNU General Public License version 2.0 (GPLv2)

Follow Rootkit Hunter

Rootkit Hunter Web Site

You Might Also Like
Real Time Accounts Payable Automation. Icon
Real Time Accounts Payable Automation.

Invoice capture and automation seamlessly integrated with your accounting software

Yooz provides the smartest, most powerful, and easiest-to-use cloud-based E-invoicing and Purchase-to-Pay automation solution. It delivers unmatched savings, speed, and security with affordable zero-risk subscriptions to more than 5,000 customers and 300,000 users worldwide.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
9
0
0
0
3
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 3 / 5

User Reviews

  • THE PRODUCT HAS BEEN ABANDONED SINCE 2018 While it may still "work" is it trustworthy, effective, accurate?
  • I'm giving this a 1 star due to it has not been updated since 2018 and giving false positives. If someone picks it up and fixes it I will give it 5 stars since it is a great tool and I would have supported it.
  • This project and many like them have made me enjoy computers even more! Thank you to the developers!! :)
  • Honestly, I've struggled for months what to rate this. Normally, I would have given rkhunter five stars, I'm using it on all my linux machines that have any kind of connection to the internet, and until recently I've been pretty happy with it, but I've started to run more and more things in containers, and rkhunter simply does not handle that at all. Every single process that is inside a container is flagged as "possible rootkit" and similar, possibly because the processes are running with UIDs that don't actually exist on the host system, and I see tons of issues filed with rkhunter where other people have the same problem, but none of them even just get acknowledged by the developers. In actual fact, the commit history (or rather, the timestamps on the last few commits) lead me to believe that rkhunter has been abandoned by its developers. Hence, only one star.
  • Very useful
Read more reviews >

Additional Project Details

Operating Systems

Linux, BSD

Programming Language

Unix Shell, Perl

Related Categories

Unix Shell Security Software, Perl Security Software

Registered

2005-12-14