a blackhat tool used to hide the attacker's activity from the administrators of the system
a catchall term for a pre-packaged script that exploits a known weakness on a computer
a collection of files/programs used by attacker(s) to re-enter a network/computer without being detected
a collection of one or more tools designed to covertly maintain control of a computer
a collection of software binaries or patches that modify an existing piece of code, usually an operating system, allowing a user to operate with administrator privileges
a collection of software specifically designed to avoid detection on an infected system
a collection of software tools which enables the cracker to hide and secure their position on a system after they have broken into it
a collection of tools and utilities that a hacker can use to hide their presence on your system and gather data to help them infiltrate further across the network
a collection of tools an intruder brings along to a victim computer after gaining initial access
a collection of tools designed to allow hackers unfettered access to a computer system, often in a manner that avoids detection by others
a collection of tools that allows an attacker, among other things, to provide a backdoor into a system, collect information about other systems on the network, and mask the fact that the system is compromised
a common name for malicious software that is used by computer criminals to hide their presence on a compromised computer
a common name for malicious software that is used by hackers or criminals to gain access to a computer system and be able to clandestinely run other malicious code
a component that uses stealth to maintain a persistent and undetectable presence on a computer
a component that uses stealth to maintain a persistent and undetectable presence on the machine
a hacker's tool, used to allow remote control of your computer
a hacker tool-set for accumulating passwords on compromised systems
a malicious program that uses system hooks to conceal its presence on the system
an application that allows an intruder to hide malicious activity on a previously compromised machine
an extremely clandestine type of malware that hides itself within operating system kernels or application binaries
a package installed by a hacker that allows to hack it
a particularly insidious type of Trojan horse that hides its existence from users and programs by tampering with the operating system on the
a particularly pernicious form of malware capable of cloaking itself and its actions
a piece of malicious code that integrates itself with the Windows operating system to hide itself and any other files that it fancies running, such as trojans and viruses
a piece of software capable of intercepting data sent to/from the processor and or RAM of your PC
a piece of software one loads onto a system after it has been compromised in order to keep it compromised and without detect
a piece of software that allows someone to remotely control and access every part of your computer
a piece of software that alters core OS functions in order to hide files, running programs and registry keys
a piece of software that bypasses most of the system functions, and works at the most basic level possible to interact with the PC
a piece of software that can be installed and hidden on your computer without your knowledge
a piece of software that changes the basic operations of a computer such as, among all things, file access
a piece of software that intercepts system code on a computer and replaces it with altered code for the purposes of hiding itself from detection
a piece of software that manages to subvert the operating system in such a way that its very existence is completely unknowable
a piece of software that unhonestly hides on your computer so it can't be detected using standard procedures
a piece of software used by hackers to cover their tracks
a piece of software which provides full control over a system and hides itself from the operating system
a powerful piece of software that takes over control of a computer at the most fundamental level
a powerful technology that hides its' presense from the OS
a program a hacker uses to hide from the user of the operating system (you)
a program or set of programs that an intruder uses to hide her presence on a computer system and to allow access to the computer system in the future
a program or set of programs used by an intruder to both hide their presence on a computer system and allow future access to that same system
a program that allows an intruder to gain access to your system without your knowledge by hiding what it is doing on the system
a program that buries itself deep in a computer's system files, running processes in memory and keeping itself from being detected
a program that is designed to hide itself and other programs, data, and/or activity including viruses, backdoors, keyloggers and spyware on a computer system
a program that is supposed to hinder piracy, but will leave the user vulnerable to hackers and other attacks
a set of programs and code that allows a permanent and undetectable presence on a computer
a set of programs introduced to a computer to maintain administrator (or "root") access to that system
a set of programs which patch and Trojan existing execution paths within the system
a set of software programs that are permanently undetectable on a computer
a set of software tools, originally recompiled Unix tools, used by an intruder after gaining access to a computer system
a set of software tools used by an intruder or illegal hacker to break into a computer and obtain root privileges in order to perform unauthorized functions, hide traces of its existence and exploit its systemwide access
a set of software tools used by intruders to conceal their activities after the computer has been compromised
a set of software tools, which are used to hide running processes, files or system data
a set of tools a hacker can use to create backdoors, capture passwords, and hide all tools used in the compromise of the server
a set of tools commonly used by hackers to circumvent antivirus software and control a computer system
a set of tools, commonly used by hackers to hide running processes and files or system data, to help them continue to access a computer undetected
a set of tools developed to crack a computer system
a set of tools that a cracker can use to hide his tracks - the kit contains trojaned(altered) versions of various utilities like ps, ifconfig, and others
a set of tools that essentially bypass all operating system security like access control lists on the file system, permissions on running processes
a set of tools used by a hacker to infiltrate a computer system without the knowledge or consent of the system's owner
a set of tools used by an intruder, after breaking into a computer and obtaining root access , in order to maintain such access, hide traces of it and exploit it
a set of utilities installed on your computer whose purpose is to hide what other programs are doing
a set of utilities which can run hidden on a computer system
a set of virus-like tools frequently used by hackers to conceal running processes and files from diagnostic and security software
a software package of programs and/or scripts that a cracker can install on any system they can gain access to, even if the current user lacks administrative rights
a software package that enables an unauthorized user to obtain root or administrative privileges on a machine
a special type of malicious software because it's hard to detect and you don't know what it is doing
a special type of malware (malicious software)
a technique that is often used by hackers and virus creators to hide the files they create
a tool designed to go undetected by the security software
a tool specifically designed to go unnoticed by security software which takes precautionary steps after a hack has been initialized
a tool that allows the malware to alter part of the operating system
a tool that helps worm authors to slip past malware detection tools
a tool that intercepts kernel-mode software calls and instead of allowing them to be processed normally by the Windows Kernel, it provides an alternate response
a tool that is designed to hide itself and other processes, data, and/or activity on a system
a tool that masquerades the presence of an attacker in a compromised system
a tool that takes a high level of control over a computer, potentially even preventing the original computer user from performing certain tasks
a type of software that attempts to take control of your computer, as well as hide its existence or the existence of other files
a type of Trojan Horse that keeps itself, other files, registry keys and network connections hidden from detection
a very malicious piece of software that is used to hide information and programs from you, on your computer
a way of hiding something from a user
a worst-case scenario of a security breach on a sensitive system, as the cracker has essentially made themselves root
A set of software tools hidden from everyone that a hacker puts on a computer to use at their discretion. Used to steal passwords, monitor keystrokes, and other malicious intent.
an Internet toolkit containing a sniffer and Trojan horse programs to hide activity and provide backdoors for later use
A hacker security tool that masks intrusion and obtains administrator level access to a computer or network.
a set of programs used to hack into a system and gain administrative-level access. May also monitor traffic and keystrokes; create a "backdoor" into the...
A software program that hides the presence, or eliminates traces of, a malware program. Rootkits can be either kernel- or application-level kits. Kernel rootkits are especially dangerous because they are difficult to detect without appropriate software.
A rootkit is a set of tools and utilities used to maintain administrator level access privileges and for an attacker to remain undetectable. They are used after this level of access has been achieved via some other means. They differ from Trojans in the level of functionality offered. A root kit is often a complete set of tools to be used to control a remote computer more fully. In some circumstances, the rootkit is buried so deeply into the host operating system that it may actually replace some of the core system files or part of the kernel itself.
A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.
Software that hides malicious programs that bypass traditional anti-virus protection.
A rootkit is a set of software tools frequently used by a third-party (usually an intruder) after gaining access to a computer system. These tools are intended to conceal running processes, files or system data, which helps an intruder maintain access to a system for purposes unbeknownst to the user. Rootkits are known to exist for a variety of operating systems such as Linux, Solaris and versions of Microsoft Windows. Rootkits became more prominent in late 2005, when it was found that Sony/BMG was including them on their music CDs.
A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
Although an exact definition of what constitutes a rootkit is still under debate, it is generally regarded as a piece of software that allows intruders to conceal malicious files and programs from users or system administrators. Rootkits can be extremely hard to uninstall and allow troublemakers to go about their dirty work undetected.
Rootkits are a technique that allows malware to hide from computer operating systems and from computer users. Rootkit techniques create stealth programs that run at a "lower" level than the user can see with normal software utilities. Malware attempts to use this method to avoid detection by security software. See also: F-Secure BlackLight - Rootkits.
A program that fraudulently gains or maintains administrator level access that may also execute in a manner that prevents detection. Once a program has gained access, it can be used to monitor traffic and keystrokes; create a backdoor into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to circumvent detection. Rootkit commands replace original system command to run malicious commands chosen by the attacker and to hide the presence of the Rootkit on the system by modifying the results returned by suppressing all evidence of the presence of the Rootkit. Rootkits are an extreme form of System Modification Software.
A set of tools that attackers can install on target systems to cover up any trace of their presence. This is often achieved by replacing the administration tools that come with an operating system, or even kernel-level device drivers, with modified versions. Many rootkits also include tools for building back doors, keystroke loggers and so forth.
A rootkit is a set of software tools intended to conceal running processes, files or system data from the operating system. Rootkits have their origin in relatively benign applications, but in recent years have been used increasingly by malware to help intruders maintain access to systems while avoiding detection. Rootkits exist for a variety of operating systems, such as Linux, Solaris and versions of Microsoft Windows.