A set of software tools used by a third party to gain unauthorized access to a computer system and control the system while concealing itself from the user.
To infect (a computer system) with a rootkit.