Despite being designed to avoid detection and hide malicious activity from sysadmins and defenders, rootkits can be detected using a variety of techniques.
rootkit detection
0001-01-01
Recent Posts
Linux Persistence: atd
2025-04-01 DFIR CTF linux persistence at atd
Linux Persistence: SSH
2025-03-29 DFIR CTF SSH hardening hunting persistence linux persistence hunting hardening SSH PAM