Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| Acronis Ransomware Protection v188.8.131.521
Acronis Ransomware Protection v184.108.40.2061 Free, battle-tested defense against ransomware. Blocks attacks Stop both known and never-before-seen ransomware Recovers files Access local cache to restore damaged data easily Backup to the Cloud Update your files automatically every 15 minutes 5 GB Cloud Free Put your most important files out of harm’s way Ransomware attacks someone every 10 seconds. Don’t be a victim. Our free tool delivers proven, powerful protection from ransomware like Petya, WannaCry and Osiris, and it’s completely compatible with all leading anti-malware solutions. Constantly guards against bad behavior Ransomware viruses can’t infect your system on Acronis’ watch. Our technology monitors your system in real-time, distinguishing normal activities from suspicious ones like unauthorized encryption. By recognizing bad behavior, it spots ransomware whether the strain is known or not. Immediately stops ransomware attacks If a process is caught trying to encrypt your files or inject malicious code into your system, Acronis stops it before any damage is done. You’re instantly notified that something suspicious was found. Then you can either block the activity or allow it to continue. Easily restores any affected files After blocking the ransomware attack, Acronis Active Protection will help you restore any files that might have been altered or infected. Our tool searches for the latest file versions and can recover clean copies from your cache, temporary files, or backup. Automatically secure files in the cloud With 5 GB of free cloud storage, you’ll not only protect your data during a ransomware attack, but also from disk failures, disasters and accidental deletions. Plus, cloud backups let you access your files from anywhere on any internet-enabled device. That’s extra protection with added convenience. Click here to visit the author's website.
|2,258||Nov 13, 2019
Acronis International GmbH.
| Bitdefender Anti-Ransomware 220.127.116.11
Bitdefender Anti-Ransomware 18.104.22.168 Bitdefender anti-malware researchers have released a new vaccine tool which can protect against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families by exploiting flaws in their spreading methods. “The new tool is an outgrowth of the Cryptowall vaccine program, in a way.” Chief Security Strategist Catalin Cosoi explained. “We had been looking at ways to prevent this ransomware from encrypting files even on computers that were not protected by Bitdefender antivirus and we realized we could extend the idea.” A study conducted by Bitdefender in November 2015 on 3,009 Internet users from the US, France, Germany, Denmark, the UK and Romania offers a victim’s perspective on data loss through crypto-ransomware: 50% of users can’t accurately identify ransomware as a type of threat that prevents or limits access to computer data. Half of victims are willing to pay up to $500 to recover encrypted data. Personal documents rank first among user priorities. UK consumers would pay most to retrieve files US users are the main target for ransomware.
|3,217||Nov 13, 2019
| Kaspersky CapperKiller 22.214.171.124
Kaspersky CapperKiller 126.96.36.199 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
|2,838||Nov 13, 2019
| Media_Repair v188.8.131.52
Media_Repair v184.108.40.206 Media_Repair will attempt to repair files encrypted by STOP/DJVU ransomware variants by making the non-encrypted part of the file playable again. Media_Repair does not decrypt files. Media_Repair currently supports following file types: WAV* MP3 Mp4* M4V* MOV* 3GP* * reference file required For most file types Media_Repair requires a reference file: This is an INTACT file created on the same device or using the same software. Ideally this reference file matches the settings that were used to create the ‘patient’ file as closely as possible. Media_Repair can not repair all files! Video that was optimized for internet streaming (fast start) can not be repaired at this time! "Due to limited testing (I have only so much STOP/DJVU affected files), current version should be considered beta!" - Joep van Steen Using Media_Repair –Use drop down box to select a file type. Now browse to folder containing your STOP/DJVU encrypted or the reference file. You can either use a patient file or reference file to test if this particular video type can be repaired by Media_Repair or not. – Click to verify selected video file is candidate for repair. You can either use the reference file or a corrupt file. If Media_Repair reports it can try repairing the file it is not a guarantee the file will actually be repaired. If it can be repaired depends in several factors such as the reference file being a good match and the size of the patient file. If it tells you it can not repair the file though it’s pretty much a guarantee the repair will fail. – Click to make the currently selected file, reference file that will be used to repair affected file(s). Once you have confirmed your video files are candidates ...
|210||Jun 25, 2020
Joep van Steen
| RansomNoteCleaner v0.9.4.1
RansomNoteCleaner v0.9.4.1 RansomNoteCleaner (beta) is a program I have created to help remove pesky ransom notes left behind by known ransomware variants. This program is powered by my service ID Ransomware, and thus is always updated with definitions on the latest known ransomwares and their ransom notes. This also allows it to be flexible in detecting the ransom notes, as it uses the exact same data ID Ransomware uses for identifying variants. When RansomNoteCleaner is first launched, it will contact the website, and pull down the latest information on known ransom notes; this is the only network activity done with the program, and no information about your system is uploaded or stored at all. If you have a network issue with reaching the website, the "Refresh Network" button is available to try again. Clicking the "Select Ransomware(s)" button allows for selecting the exact variant(s) to clean ransom notes from. This is recommended if you have already identified the ransomware, as it will take much less time to search for the notes. Once the ransomware variant(s) have been confirmed, you may press the "Search for Ransom Notes" button to select a directory (or whole drive), and start the search for known ransom notes. Once the scan has completed, the "Clean!" button will be available. A final window will display all found ransom notes before continuing with deletion. I highly recommend double-checking the file list before confirming the deletion. I am not responsible for loss of data if you confirm this step. A full log of deleted ransom notes will be saved to a file "RansomNoteCleaner.log" in the same directory RansomNoteCleaner is run from. Please note that this program does not decrypt data. It is simply a tool for removing the pesky ransom notes that are littered on the system after a ransomware attack. Please also ...
|2,028||Nov 13, 2019
| WannaSmile 0.1
WannaSmile 0.1 WannaCry Ransomware is spreading like wild fire. It uses vulnerability in Microsoft's SMB ( which is turned on by default ). On 13th may 2017 , security researcher going with the handle @malwaretech and Darien Huss found a 'kill-switch' which paused the ransomware. Basically the ransomware opens a unregistered domain and if fail to open then the system is infected. So @malwaretech registered the domain which stopped the ransomware. Soon Cyber criminals around the world DDOSed it to take it down so that the ransomware can continue affecting. Also the 'kill-switch' won't work if : System is not connected to internet If the 'kill-switch' domain is down If it is blocked by the isp or firewall The solution WannaSmile is a simple program which can solve the problem It can do the following : It will disable SMB in your system ( which is enabled by default ) ( OnlineFix ) It will edit your host file and add google's IP to the 'kill-switch' ( which means even if the site goes down you wont be affected ) ( OfflineFix ) It will create a lightweight local web server and add localhost to 'Kill-switch' Tip Use the OnlineFix if you are always connected to the internet Use the OfflineFix if you are not connected to the internet. How to run You directly run the .exe file and it will do the magic. ( Right-click on file and Run as Administrator ).
|2,057||Nov 13, 2019
|Showing rows 1 to 6 of 6||Showing Page 1 of 1||1|
Copyright (c) 2020