Forrest logo
tool overview
On this page you find all important commands for the CLI tool rkhunter. If the command you are looking for is missing please ask our AI.


rkhunter (Rootkit Hunter) is a command line tool used for scanning systems to detect rootkits, backdoors, and other potentially malicious software. It performs various checks on the system by comparing the results against known malicious signatures.

The tool aims to identify any unauthorized modifications to critical system files, suspicious user accounts, or hidden processes that could indicate a compromise. It scans important system binaries, shared libraries, network ports, and system configuration files to look for any suspicious activities or signs of intrusion.

rkhunter uses various techniques to ensure the integrity of system files, such as comparing file hashes, checking for backdoors in network services, and verifying digital signatures of system binaries. It also incorporates database and file integrity checks to detect any unauthorized changes.

The tool provides a detailed report of the scan results, including any potential threats or issues found during the scan. It can be scheduled to run automatically, making it useful for regular system maintenance and security monitoring.

rkhunter is primarily used in Unix-like systems such as Linux, FreeBSD, and macOS. It is considered a valuable security tool for system administrators and security professionals to detect and mitigate potential security risks.

List of commands for rkhunter:

tool overview