• Chrome Cleanup Tool Logo

    Chrome Cleanup Tool

    The Chrome Cleanup Tool is a program written by Google that will scan a computer for programs that cause problems in Google Chrome. The targeted applications are potentially unwanted programs, malware, badware, and adware extensions that cause advertisements or other wanted actions to appear in Chrome.

    • Total Downloads: 56,394
    • Downloads last week: 1,957
    •   July 31, 2016
  • GhostCryptDecrypter Logo


    GhostCrypt Decrypter is a free decryption program created by Michael Gillespie for the GhostCrypt Ransomware. Using this decryptor a victim of the GhostCrypt Ransomware can decrypt their files for free without having to pay the ransom. If you need help using the decryptor, you can receive support in the GhostCrypt Help & Support Topic.

    • Total Downloads: 1,958
    • Downloads last week: 46
    •   January 17, 2017
  • RansomNoteCleaner Logo


    RansomNoteCleaner is a program that can be used to scan a ransomware victim's computer for left over ransom notes and elete them. When someone is infected by ransomware they are commonly left with hundreds of ransom notes that they have to manually delete. Using RansomNoteCleaner, a ransomware victim can scan their computer for ransom notes and have them deleted automatically.

    • Total Downloads: 7,795
    • Downloads last week: 203
    •   January 17, 2017
  • McAfee Real Protect Logo

    McAfee Real Protect

    McAfee Real Protect is a real-time behavior program that monitors your computer for suspicious activity. Real Protect utilizes machine learning and behavioral detections in the cloud to detect zero-day malware.

    • Total Downloads: 6,548
    • Downloads last week: 74
    •   April 27, 2016
  • McAfee Stinger Logo

    McAfee Stinger

    McAfee Stinger is a standalone utility that is designed to target and remove specific computer infections and viruses. This program is not an anti-virus solution, but rather a utility that can be used to remove stubborn infections that are difficult to remove.

    • Total Downloads: 10,543
    • Downloads last week: 141
    •   April 27, 2016
  • Symantec Kovter Removal Tool Logo

    Symantec Kovter Removal Tool

    The Symantec Kovter Removal Tool can be used to remove the Kovter infection from your computer.  The Kovter infection is a Click Fraud Trojan as it generates automated clicks on advertisements.  

    • Total Downloads: 17,953
    • Downloads last week: 136
    •   March 23, 2016
  • Unchecky Beta Logo

    Unchecky Beta

    Unchecky is a program that automatically unchecks offers that are commonly bundled with free programs that you download off the Internet. When installing software, Unchecky looks for unrelated offers and automatically unchecks them so that you do not accidentally install something that you do not want on your computer.

    • Total Downloads: 9,052
    • Downloads last week: 46
    •   November 30, 2015
  • Rem-VBSworm Logo


    Rem-VBSworm is a utility created by the Panda Security employee and malware researcher Bart Blaze.  This tool is used to remove VBS and Windows Script Host malware from a machine or in a network. 

    • Total Downloads: 61,080
    • Downloads last week: 450
    •   June 07, 2016
  • Panda USB Vaccine Logo

    Panda USB Vaccine

    Panda USB Vaccine is a free security utility that allows you to block malware from spreading through USB drives.  These types of malware typically install an Autorun.inf file in the root of the USB drive that causes the malware to execute when you insert them into a computer. 

    • Total Downloads: 19,760
    • Downloads last week: 196
    •   January 28, 2016
  • Delfix Logo


    Delfix is a program that remove the various security tools, and their files, that are commonly used in online computer help forums. When helpers assist people in troubleshooting their computer or with virus removal, they recommend tools that commonly leave behind log files, quarantines, or other files that are not removed when the support process is completed.  Delfix is a program that can be used as the last step in the support process to clean up all of these leftovers.

    • Total Downloads: 87,240
    • Downloads last week: 539
    •   April 05, 2016


Remember Me
Sign in anonymously