List Of Currently Detected Rookits

A rootkit contains a set of tools and replacement executables for many of the operating system's critical components, used to hide evidence of the attacker's presence and to give the attacker backdoor access to the system.

Rootkits require root access to to install, but once set up, the attacker can get root access back at any time.


  • For More Info About ROOKITS, Click Here.

    But most of the times, a Sound administrator woudl catch them, very easily with tools available in the market.


  • The following rootkits, worms and LKMs are currently detected:
    01. lrks, lrk3, lrk4, lrk5, lrk6 (and variants);
    02. Solaris rootkit;
    03. FreeBSD rootkit;
    04. torn (and variants);
    05. Ambient's Rootkit (ARK);
    06. Ramen Worm;
    07. rh[67]-shaper;
    08. RSHA;
    09. Romanian rootkit;
    10. RK17;
    11. Lion Worm;
    12. Adore Worm;
    13. LPD Worm;
    14. kenny-rk;
    15. Adore LKM;
    16. ShitC Worm;
    17. Omega Worm;
    18. Wormkit Worm;
    19. Maniac-RK;
    20. dsc-rootkit;
    21. Ducoci rootkit;
    22. x.c Worm;
    23. RST.b trojan;
    24. duarawkz;
    25. knark LKM;
    26. Monkit;
    27. Hidrootkit;
    28. Bobkit;
    29. Pizdakit;
    30. torn v8.0;
    31. Showtee;
    32. Optickit;
    33. T.R.K;
    34. MithRa's Rootkit;
    35. George;
    36. SucKIT;
    37. Scalper;
    38. Slapper A, B, C and D;
    39. OpenBSD rk v1;
    40. Illogic rootkit;
    41. SK rootkit.
    42. sebek LKM;
    43. Romanian rootkit;
    44. LOC rootkit;
    45. shv4 rootkit;
    46. Aquatica rootkit;
    47. ZK rootkit;
    48. 55808.A Worm;
    49. TC2 Worm;
    50. Volc rootkit;
    51. Gold2 rootkit;
    52. Anonoying rootkit;
      


    Hopes you guys Found it interesting. 


    2 comments:

    jane holly said...

    This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

    -Phone hacks (remotely)
    -Credit repair
    -Bitcoin recovery (any cryptocurrency)
    -Make money from home (USA only)
    -Social media hacks
    -Website hacks
    -Erase criminal records (USA & Canada only)
    -Grade change

    Email: onlineghosthacker247@ gmail .com

    Amalia Eva said...

    I Want to use this medium in appreciating hacking setting, after being ripped off my money,he helped me find my cheating lover whom i trusted alot and he helped me hack his WHATSAPP, GMAIL and kik and all other platforms and i got to know that he has being cheating on me, in less than 24 hours he helped me out with everything, hacking setting is trust worthy and affordable contact him on: hackingsetting50 at gmail dot com

    Post a Comment

    STEALTH HACKER

    Sponsers