Rootkit Detectors Niche-specific hacker tools

Top Ten Hacking Tools of 2016Linux Pentesting (Hacking) Distros

This is our recommended list of “Rootkit Detection” hacker tools that a professional pentester (penetration tester), ethical hacker, digital forensics or cybersecurity enthusiast should know how to use effectively. We regularly update this list so please let us know if there is a hacking tool you’d like us to add!

Five most common uses for Rootkit Detectors

  • Scans, detects and removes rootkits.
  • Discover and therefore remove malware that is often associated with rootkits.
  • Deploy detection methods that include behavioral-based methods, signature scanning, difference scanning, or memory dump analysis.
  • Detect whether there is effective enforcement of digital rights management (DRM).
  • Detect attacks, for example, in a honeypot.