- Home
- Endpoint Security
- Endpoint Detection and Response
- Rootkit Hunter
Rootkit Hunter
A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.

Rootkit Hunter
A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.
Rootkit Hunter Description
Rootkit Hunter is a Unix-based tool that scans for rootkits and other malware on a system. It can detect and remove rootkits, backdoors, and other types of malware. It also provides a detailed report of the scan results. Rootkit Hunter is designed to be easy to use and provides a simple command-line interface. It can be run from a bootable CD or USB drive, making it a useful tool for incident response and forensics. Rootkit Hunter is open-source and is available for download from the project's website. Rootkit Hunter is a powerful tool for detecting and removing malware, and is a valuable addition to any security professional's toolkit.
Rootkit Hunter FAQ
Common questions about Rootkit Hunter including features, pricing, alternatives, and user reviews.
Rootkit Hunter is A Unix-based tool that scans for rootkits and other malware on a system, providing a detailed report of the scan results.. It is a Endpoint Security solution designed to help security teams with Incident Response, Digital Forensics, Open Source.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox