Limit to suite: [buster] [buster-updates] [buster-backports] [bullseye] [bullseye-updates] [bullseye-backports] [bookworm] [bookworm-updates] [bookworm-backports] [trixie] [sid] [experimental]
Limit to a architecture: [alpha] [amd64] [arm] [arm64] [armel] [armhf] [avr32] [hppa] [hurd-i386] [i386] [ia64] [kfreebsd-amd64] [kfreebsd-i386] [m68k] [mips] [mips64el] [mipsel] [powerpc] [powerpcspe] [ppc64] [ppc64el] [riscv64] [s390] [s390x] [sh4] [sparc] [sparc64] [x32]
Search in all architectures
Some results have not been displayed due to the search parameters.
You have searched for packages that names contain unhide in all suites, all sections, and architecture(s) x32. Found 4 matching packages.
Exact hits
Package unhide
- sid (unstable) (admin):
forensic tool to find hidden processes and ports
20220611-1 [debports]: x32
Other hits
Package unhide-dbgsym
- sid (unstable) (debug):
debug symbols for unhide
20220611-1 [debports]: x32
Package unhide-gui
- sid (unstable) (admin):
graphical user interface for unhide
20220611-1 [debports]: x32
Package unhide.rb
- buster (oldoldstable) (admin):
Forensics tool to find processes hidden by rootkits
22-4: all - bullseye (oldstable) (admin):
Forensics tool to find processes hidden by rootkits
22-5: all - bookworm (stable) (admin):
Forensics tool to find processes hidden by rootkits
22-6: all - trixie (testing) (admin):
Forensics tool to find processes hidden by rootkits
22-6: all - sid (unstable) (admin):
Forensics tool to find processes hidden by rootkits
22-6: all