- MD5 hash compare
- Look for default files used by rootkits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files
Download Rootkit Hunter
Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.
Struggling with GDPR and privacy-focused browsers? Harness first-party data to transform customer engagement.New Threats, New Strategies
From Humans to Bots: Every Identity in Your SaaS App Could Be a Backdoor for Cybercriminals.