fbpx

RootRepeal-Rootkit Detector Tool

Rootkit or simply a backdoor and on windows terminology we can call it malware, that allows an attacker to maintain access on a operating system. Rootkit is simply a software and a program that hide itself and continuously connect to it server.
There are different tools available to remove malware, as we have discussed about the best antivirus for windows.


When we are talking about rootkit it generally means a piece of software than can run on Unix like operating system including Linux and BSD. There are different rootkit remover and detector available to fight against these backdoors, this article will discuss about RootRepeal.


RootRepeal is a new rootkit detector that is available for public now, it has a great features. Easy to use and user friendly if you have a little computer skills you can use it. It is a power tool that can detect all the rootkits that are available on public.

Key Features
  1. Driver Scan – scans the system for kernel-mode drivers.  Displays all drivers currently loaded, and shows if a driver has been hidden, and whether the driver’s file is visible on-disk.
  2. Files Scan – scans any fixed drive on the system for hidden, locked or falsified* files.
  3. Processes Scan – scans the system for processes.  Displays all processes currently running, and shows if a processes is hidden or locked.
  4. SSDT Scan – shows whether any of the functions in the System Service Descriptor Table (SSDT) are hooked.
  5. Stealth Objects Scan – attempts to determine if any rootkits are active by looking for typical symptoms.
  6. Hidden Services Scan – scans for hidden system services.
  7. Shadow SSDT Scan – counterpart to the SSDT Scan, but deals mostly with graphics and window-related functions.

There are different version available click on the above link to get the latest version, it is applicable on windows operating system, only x86 version of windows are supported. 


Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...