windows9download

You Here : Home > Linux

Zeppoo 0.0.3d

OS Support:


Publisher

Publisher Old version

Update:

February 8 2012

Download:

Zeppoo 0.0.3d


Description

zeppoo can detect if a rootkit is installed on your system. Zeppoo can detect if a rootkit is installed on your system.Zeppoo can also detect hidden tasks, syscalls, some corrupted symbols, modules, and also hidden connections.For that he mainly uses / dev / kmem to inspect directly kernel memory, and, if possible, / dev / mem. Installation: Zeppoo uses a micro lib (pico?) To obtain the descriptor table to Break with assembly instructions, but we provide a compiled version directly called ulibzeppo.soIf you want to compile your own version, you must have the software python-devel installed, then compile with: python setup.py buildVisualization: ** Responsibilities:. / Tasks zeppoo.py-v ** syscalls:. / Syscalls zeppoo.py-v ** Networks:. / V-zeppoo.py networksChecking: ** Responsibilities:. / C ** zeppoo.py tasks Networks:. / C zeppoo.py networksFingerprint: ** New:. / Zeppoo.py create-f FILE ** Checking:. / Zeppoo.py - checkOthers FILE f: ** To change the default device (/ dev / kmem):-D ** PERIPH To use mmap to search for symbols (fastest):-mExamples: ** The visualization tasks by / dev / mem mmap with:. / Zeppoo.py tasks vd / dev / mem-m ** Doing fingerprints using / dev / mem:. / F FILE zeppoo.py-create-d / dev / mem ** check fingerprint using / dev / mem:. / Zeppoo.py-f File Check-d / dev / memWhat's new in this version: · check for a binary (execve binfmt) • Add symbols verification (only execve)


Related Downloads


  • zeppoo beta
  • zeppoo allows you to detect rootkits on i386 and x86_64 architecture under Linux, by using /dev/kmem and /dev/mem. Moreover it can also detect hidden tasks, connections, corrupted symbols, system calls... and so many other things....

    Software Tags

    Zeppoo | Zeppoo 0.0.3d | Zeppoo Free Download | Zeppoo Reviews | Download Zeppoo

    Size :

    Next/Pre