• RansomNoteCleaner Logo

    RansomNoteCleaner

    RansomNoteCleaner is a program that can be used to scan a ransomware victim's computer for left over ransom notes and elete them. When someone is infected by ransomware they are commonly left with hundreds of ransom notes that they have to manually delete. Using RansomNoteCleaner, a ransomware victim can scan their computer for ransom notes and have them deleted automatically.

    • Total Downloads: 11,316
    • Downloads last week: 62
    •   January 17, 2017
  • MicroCop Decryptor Logo

    MicroCop Decryptor

    MicroCopy Decryptor is a free decryption program created by Michael Gillespie for variants of the Microcop Ransomware. Using this decryptor a victim of the MicroCop Ransomware can decrypt their files for free without having to pay the ransom.

    • Total Downloads: 2,155
    • Downloads last week: 14
    •   January 17, 2017
  • Jigsaw Decrypter Logo

    Jigsaw Decrypter

    JigsawDecrypter is a free decryption program created by Michael Gillespie for variants of the Jigsaw Ransomware. Using this decryptor a victim of the Jigsaw Ransomware can decrypt their files for free without having to pay the ransom.

    • Total Downloads: 9,945
    • Downloads last week: 66
    •   July 29, 2016
  • Notepad++ Logo

    Notepad++

    Notepad++ is a free source code editor and Notepad replacement that supports several languages. Written in C++ using a pure Win32 API, Notepad++ provides greater performance and a smaller program size. It's true power, though, comes with its programming language syntax highlighting and the ability to customize the program as required by the particular users.

    • Total Downloads: 7,300
    • Downloads last week: 57
    •   November 21, 2016
  • McAfee Real Protect Logo

    McAfee Real Protect

    McAfee Real Protect is a real-time behavior program that monitors your computer for suspicious activity. Real Protect utilizes machine learning and behavioral detections in the cloud to detect zero-day malware.

    • Total Downloads: 8,462
    • Downloads last week: 56
    •   April 27, 2016
  • McAfee Stinger Logo

    McAfee Stinger

    McAfee Stinger is a standalone utility that is designed to target and remove specific computer infections and viruses. This program is not an anti-virus solution, but rather a utility that can be used to remove stubborn infections that are difficult to remove.

    • Total Downloads: 14,216
    • Downloads last week: 85
    •   April 27, 2016
  • WMI Explorer Logo

    WMI Explorer

    WMI Explorer allows users to easily view and configure the WMI information configured on their computer.  For those who perform system administration tasks using WMI, this is an incredibly useful tool.

    • Total Downloads: 5,167
    • Downloads last week: 36
    •   April 24, 2016
  • Symantec Kovter Removal Tool Logo

    Symantec Kovter Removal Tool

    The Symantec Kovter Removal Tool can be used to remove the Kovter infection from your computer.  The Kovter infection is a Click Fraud Trojan as it generates automated clicks on advertisements.  

    • Total Downloads: 23,539
    • Downloads last week: 136
    •   March 23, 2016
  • IObit Unlocker Logo

    IObit Unlocker

    IObit Unlocker is a free program that allows you to unlock in use or locked files so that you delete, rename, or move them.  It is not uncommon for applications to keep a file open, even when they are not being used.  When you try to remove these files, Windows will display an error that states the file is in use and won't let you access it.

    • Total Downloads: 10,130
    • Downloads last week: 81
    •   March 22, 2016
  • Sophos Home Logo

    Sophos Home

    Sophos Home is a free Internet security product that protects Windows and Mac computers from malware and malicious web sites. Sophos Home can be installed on up to 10 Mac and Windows computers, where they can be managed from a single account on the Sophos Home website. In addition to standard definitions based malware detections, Sophos Home also utilizes signature-­-less behavioral-­-based heuristics, a Host Intrusion Protection System (HIPS), malicious url blocking, and web filtering.

    • Total Downloads: 8,193
    • Downloads last week: 64
    •   March 20, 2016

Login

Remember Me
Sign in anonymously