You can use boolean logic (e.g. AND/OR/NOT) for complex search queries. For more help and examples, see the search documentation.
Search by package name:
my-package (implicit)
name:my-package (explicit)
Search by package filename:
filename:my-package.ext
Search by package tag:
tag:latest
Search by package version:
version:1.0.0
prerelease:true (prereleases)
prerelease:false (no prereleases)
Search by package architecture:
architecture:x86_64
Search by package distribution:
distribution:el
Search by package license:
license:MIT
Search by package format:
format:deb
Search by package status:
status:in_progress
Search by package file checksum:
checksum:5afba
Search by package security status:
severity:critical
Search by package vulnerabilities:
vulnerabilities:>1
vulnerabilities:<1000
Search by # of package downloads:
downloads:>8
downloads:<100
Search by package type:
type:binary
type:source
Search by package size (bytes):
size:>50000
size:<10000
Search by dependency name/version:
dependency:log4j
dependency:log4j=1.0.0
dependency:log4j>1.0.0
Search by uploaded date:
uploaded:>"1 day ago"
uploaded:<"August 14, 2022 EST"
Search by entitlement token (identifier):
entitlement:3lKPVJPosCsY
Search by policy violation:
policy_violated:true
deny_policy_violated:true
license_policy_violated:true
vulnerability_policy_violated:true
Search by repository:
repository:repo-name
Search by last download date:
last_downloaded:<"30 days ago"
last_downloaded:>"August 14, 2022 EST"
Search queries for all Debian-specific (and related) package types
Search by component:
deb_component:unstable
Search queries for all Maven-specific (and related) package types
Search by group ID:
maven_group_id:org.apache
Search queries for all Docker-specific (and related) package types
Search by image digest:
docker_image_digest:sha256:7c5..6d4
(full hashref only)
Search by layer digest:
docker_layer_digest:sha256:4c4..ae4
(full hashref only)
Field type modifiers (depending on the type, you can influence behaviour)
For all queries, you can use:
~foo for negation
For string queries, you can use:
^foo to anchor to start of term
foo$ to anchor to end of term
foo*bar for fuzzy matching
For number/date or version queries, you can use:
>foo for values greater than
>=foo for values greater / equal
<foo for values less than
<=foo for values less / equal
Need a secure and centralised artifact repository to deliver Alpine,
Cargo,
CocoaPods,
Composer,
Conan,
Conda,
CRAN,
Dart,
Debian,
Docker,
Go,
Helm,
Hex,
HuggingFace,
LuaRocks,
Maven,
npm,
NuGet,
P2,
Python,
RedHat,
Ruby,
Swift,
Terraform,
Vagrant,
Raw & More packages?
Cloudsmith is the new standard in Package / Artifact Management and Software Distribution.
With support for all major package formats, you can trust us to manage your software supply chain.
unhide
20130526-3+deb10u1
One-liner (summary)
Description
unhide detects hidden processes using the following six techniques: * Compare /proc vs /bin/ps output * Compare info gathered from /bin/ps with info gathered by walking thru the procfs. * Compare info gathered from /bin/ps with info gathered from syscalls (syscall scanning). * Full PIDs space occupation (PIDs bruteforcing) * Reverse search, verify that all thread seen by ps are also seen by the kernel (/bin/ps output vs /proc, procfs walking and syscall) * Quick compare /proc, procfs walking and syscall vs /bin/ps output
unhide-tcp identifies TCP/UDP ports that are listening but are not listed in /bin/netstat through brute forcing of all TCP/UDP ports available.
This package can be used by rkhunter in its daily scans.
This package is useful for network security checks, in addition to forensics investigations.
| Status | Completed |
|---|---|
| Checksum (MD5) | fcec2cdbed8ec7b094339b5e18f7489e |
| Checksum (SHA-1) | 9001e1a754505a2bed534527856d64a02b808d2c |
| Checksum (SHA-256) | d414a2765c47bdfde5aaf1696ea50a1fdfc434291ba4bbbfae323a91d6376619 |
| Checksum (SHA-512) | 9f2cb418162434182f42c02fddfa8026bc76cee70154c3891f2c885ae7599f8a86… |
| GPG Signature | |
| GPG Fingerprint | c0a114330029b468b1146f70c334efcb2c4f9be3 |
| Distribution | debian/buster - Debian - 10 (Buster) |
| Storage Region | Dublin, Ireland |
| Type | Binary (contains binaries and binary artifacts) |
| Uploaded At | 8 months, 1 week ago |
| Uploaded By |
|
| Slug Id | unhide_20130526-3deb10u1_armhfdeb-dfo1 |
| Unique Id | ILgNBDrFuVMD |
| Version (Raw) | 20130526-3+deb10u1 |
| Version (Parsed) |
|
| extended metadata | |
| Homepage | http://www.unhide-forensics.info |
| Installed Size | 115.0 KB |
| Maintainer | Debian Security Tools <team+pkg-security@tracker.debian.org> |
| Priority | optional |
| Section | admin |
| pkg | unhide_20130526-3+deb10u1_armhf… |
0
49.2 KB |
md5 | sha1 | sha256 | sha512 |
This package has 33 files/directories.
|
|
unhide |
0 |
|
Dependencies
2
Checksum (md5)
84334a68d738dca531d8af0e4fcfa59e
|
Depends
|
libc6 | >=2.7 |
|
Suggests
|
rkhunter |
These instructions assume you have setup the repository first (or read it).
To install/use unhide @ version 20130526-3+deb10u1 ...
To install packages, you can quickly setup the repository automatically (recommended):
curl -1sLf \
'https://dl.cloudsmith.io/public/ultimaker/debian-backup/setup.deb.sh' \
| sudo -E bash
If you need to force a specific distribution, release/version, architecture, or component (if supported), you can also do that (e.g. if your system is compatible but not identical):
curl -1sLf \
'https://dl.cloudsmith.io/public/ultimaker/debian-backup/setup.deb.sh' \
| sudo -E distro=debian codename=buster arch=ARCH component=COMPONENT bash
or ... you can manually configure it yourself before installing packages:
apt-get install -y debian-keyring # debian only
apt-get install -y debian-archive-keyring # debian only
apt-get install -y apt-transport-https
# For Debian Stretch, Ubuntu 16.04 and later
keyring_location=/usr/share/keyrings/ultimaker-debian-backup-archive-keyring.gpg
# For Debian Jessie, Ubuntu 15.10 and earlier
keyring_location=/etc/apt/trusted.gpg.d/ultimaker-debian-backup.gpg
curl -1sLf 'https://dl.cloudsmith.io/public/ultimaker/debian-backup/gpg.C334EFCB2C4F9BE3.key' | gpg --dearmor >> ${keyring_location}
curl -1sLf 'https://dl.cloudsmith.io/public/ultimaker/debian-backup/config.deb.txt?distro=debian&codename=buster&component=main' > /etc/apt/sources.list.d/ultimaker-debian-backup.list
sudo chmod 644 ${keyring_location}
sudo chmod 644 /etc/apt/sources.list.d/ultimaker-debian-backup.list
apt-get update
sudo apt-get install unhide=20130526-3+deb10u1