http://zqktlw5bf6oycxq6qod452xnvdfcqhfwliz54bkul736g6b454jrk2ad.onion/wiki/index.php?title=Intrusive_Surveillance&action=edit
They will help you check for common ways rootkit modules hide themselves, and also can help you to ensure your kernel syscall path has not been tampered with. The ideas are based on this Security Focus article and this article on rootkit operation . All methods discussed there can be examined with those modules.