
chkproc.c – checks for signs of LKM trojans. check_wtmpx.c – checks for wtmpx deletions (Solaris only). chkwtmp.c – this checks for wtmp deletions. chklastlog.c – this checks for lastlog deletions. ifpromisc.c – it checks if an interface is in promiscuous mode. chkrootkit – a shell script that checks system binaries for rootkit modification. It contains various programs/scripts which include: It is a lightweight tool that scans your system for signs of rootkits, which are malicious programs that can grant unauthorized access and control over a compromised system. $ sudo zypper install clamav ĬhkrootKit is a free and open-source security scanner designed to detect known rootkits on Unix-like systems, including Linux. To install ClamAV on a system, you can use the default package manager on your Linux distribution. It can scan within archives and compressed files (also protects against archive bombs), and the built-in support includes Zip, Tar, 7Zip, and Rar among others. Supports on-access scanning (Linux only). Works primarily from the command-line interface. #MALWAREBYTES ALTERNATIVE LINUX MAC OS X#
It’s cross-platform works on Linux, Windows, and Mac OS X.The following are its well-known ClamAV features:
These signatures are regularly updated to keep up with new threats.Īdditionally, ClamAV can also perform heuristic analysis, which involves examining the behavior of files and identifying potentially malicious patterns. It’s a standard for mail gateway scanning software it supports almost all mail file formats and it is primarily used on Unix-like systems such as Linux, FreeBSD, and macOS, but it also has support for Windows.ĬlamAV operates on a signature-based detection method, which means it scans files for patterns that match known malware signatures.