RootRepeal-Rootkit Detector Tool

Rootkit or simply a backdoor and on windows terminology we can call it malware, that allows an attacker to maintain access on a operating system. Rootkit is simply a software and a program that hide itself and continuously connect to it server.
There are different tools available to remove malware, as we have discussed about the best antivirus for windows.


When we are talking about rootkit it generally means a piece of software than can run on Unix like operating system including Linux and BSD. There are different rootkit remover and detector available to fight against these backdoors, this article will discuss about RootRepeal.


RootRepeal is a new rootkit detector that is available for public now, it has a great features. Easy to use and user friendly if you have a little computer skills you can use it. It is a power tool that can detect all the rootkits that are available on public.

Key Features
  1. Driver Scan – scans the system for kernel-mode drivers.  Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver’s file is visible on-disk.
  2. Files Scan – scans any fixed drive on the system for hidden, locked or falsified* files.
  3. Processes Scan – scans the system for processes.  Displays all processes currently running, and shows if a processes is hidden or locked.
  4. SSDT Scan – shows whether any of the functions in the System Service Descriptor Table (SSDT) are hooked.
  5. Stealth Objects Scan – attempts to determine if any rootkits are active by looking for typical symptoms.
  6. Hidden Services Scan – scans for hidden system services.
  7. Shadow SSDT Scan – counterpart to the SSDT Scan, but deals mostly with graphics and window-related functions.

There are different version available click on the above link to get the latest version, it is applicable on windows operating system, only x86 version of windows are supported. 


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top Suggestions To Minimize Cyber Attack Risks

The Cyber Protection and Cyber Attack definition play an important role in maintaining both global security and operational productivity due to the rapid proliferation...

Policing the Dark Web (TOR): How Authorities track People on Darknet

The darknet, especially the TOR network, can be hacked, or the information of the people using it can be extracted in the plain text....

Best VPNs for Android – and Why You Need One Now

Most people protect their laptops and computers from potential cyber-attacks but only consider the cybersecurity of their mobile devices when it’s too late. In recent...

The Levels of the Internet Surface Web, Deep Web, and Dark Web

The internet, invented by Vinton Cerf and Bob Cahn, has evolved since its creation in the 1960s. In 1990, the World Wide Web transformed...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.