Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Please buy our over-priced stuff here.  


Join our Facebook groupFollow us on TwitterFollow us on Instagram




 Home » OlderGeeks.com Freeware Downloads » Anti-Virus, Anti-Malware, Security Utilities » Rootkit Removers/Rootkit Protection   
Files
  File Name Rating Downloads
Last Update/Developer
Bitdefender Rootkit Remover 32bit 3.0.2.1
Bitdefender Rootkit Remover 32bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 5,072 Nov 13, 2019
BitDefender Labs
Bitdefender Rootkit Remover 64bit 3.0.2.1
Bitdefender Rootkit Remover 64bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 5,227 Nov 13, 2019
BitDefender Labs
GMER 2.2.19882
GMER 2.2.19882 GMER is an application that detects and removes rootkits . It scans for: hidden processes hidden threads hidden modules hidden services hidden files hidden disk sectors (MBR) hidden Alternate Data Streams hidden registry keys drivers hooking SSDT drivers hooking IDT drivers hooking IRP calls inline hooks GMER runs on Windows XP/VISTA/7/8/10 Version History: This is list of changes for each release of GMER: 2.2 - Added support for Windows 10 - Improved files & disk scanning FAQ Frequently Asked Questions Question: Do I have a rootkit? Answer: You can scan the system for rootkits using GMER. Run gmer.exe, select Rootkit tab and click the "Scan" button. If you don't know how to interpret the output, please Save the log and send it to my email address. Warning ! Please, do not select the "Show all" checkbox during the scan. Question: How to create "3rd party" log ? Answer: Tick "3rd party" option and then click the "Scan" button. After the scan you can use "Remove signed" and "Remove duplicates" options to filter the scan results. Question: How to install the GMER software ? Answer: Just run gmer.exe. All required files will be copied to the system during the first lanuch. Question: How to uninstall/remove the GMER software from my machine ? Answer: Just delete the exe file. Question: My computer is infected and GMER won't start: Answer: Try to rename gmer.exe to iexplore.exe and then run it. Question: How do I remove the Rustock rootkit ? Answer: When GMER detects hidden service click "Delete the service" and answer YES to all questions. Question: How do I show all NTFS Streams ? Answer: On the "Rootkit Tab" select only: Files + ADS + Show all options and then click the Scan button. Question: Can I launch GMER in Safe Mode ? Answer: Yes, you can launch GMER in Safe Mode, however rootkits which don't work in Safe Mode won't be detected. Question: I am confused as to use delete or disable the hidden "service". Answer: Sometimes "delete ...
5/5 6,092 Nov 13, 2019
Gmer
Kaspersky TDSSKiller v3.1.0.28
Kaspersky TDSSKiller v3.1.0.28 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. The TDSSKiller tool is designed to detect and remove malware from the Rootkit.Win32.TDSS family, as well as bootkits and rootkits. These include the following malicious applications: Backdoor.Win32.Phanta.a,b Backdoor.Win32.Sinowal.knf,kmy Backdoor.Win32.Trup.a,b Rootkit.Boot.Mebusta.a Rootkit.Boot.Backboot.c Rootkit.Boot.Aeon.a Rootkit.Boot.Adrasteia.a Rootkit.Boot.Backboot.a Rootkit.Boot.Batan.a Rootkit.Boot.Bootkor.a Rootkit.Boot.Clones.a Rootkit.Boot.CPD.a,b Rootkit.Boot.Fisp.a Rootkit.Boot.Geth.a Rootkit.Boot.Goodkit.a Rootkit.Boot.Harbinger.a Rootkit.Boot.Krogan.a Rootkit.Boot.Lapka.a Rootkit.Boot.MyBios.b Rootkit.Boot.Nimnul.a Rootkit.Boot.Nix.a Rootkit.Boot.Pihar.a,b,c Rootkit.Boot.Plite.a Rootkit.Boot.Prothean.a Rootkit.Boot.Qvod.a Rootkit.Boot.Sawlam.a Rootkit.Boot.Smitnyl.a Rootkit.Boot.SST.a,b Rootkit.Boot.SST.b Rootkit.Boot.Wistler.a Rootkit.Boot.Xpaj.a Rootkit.Boot.Yurn.a Rootkit.Win32.PMax.gen Rootkit.Win32.Stoned.d Rootkit.Win32.TDSS Rootkit.Win32.TDSS.mbr Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k Trojan-Clicker.Win32.Wistler.a,b,c Trojan-Dropper.Boot.Niwa.a Trojan-Ransom.Boot.Mbro.d,e Trojan-Ransom.Boot.Mbro.f ...
5/5 7,854 Nov 13, 2019
Kaspersky Lab
Malwarebytes Anti-Rootkit v1.10.3.1001
Malwarebytes Anti-Rootkit v1.10.3.1001 Malwarebytes Anti-Rootkit is a handy and reliable application designed to scan, detect and clean malicious rootkits that reside on your computer. The archive also includes a handy utility that repairs the damage caused by the presence of rootkits. This operation requires a reboot in order to apply the fixes. Click here to visit the author's website.
5/5 6,079 Nov 13, 2019
Malwarebytes
McAfee Rootkit Remover 0.8.9.209
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ...
5/5 3,205 Nov 13, 2019
McAfee Labs
Trend Micro Rootkit Buster v5.00.1212 32bit
Trend Micro Rootkit Buster v5.00.1212 32bit Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors. Click here to visit the author's website.
5/5 3,103 Dec 01, 2019
Trend Micro Inc.
Trend Micro Rootkit Buster v5.00.1212 64bit
Trend Micro Rootkit Buster v5.00.1212 64bit Trend Micro RootkitBuster scans hidden files, registry entries, processes, drivers, services, ports, and the master boot record (MBR) to identify and remove rootkits. Malicious software called rootkits can manipulate the components of the Microsoft Windows operating system to conceal how they cause harm. Rootkits can hide drivers, processes, and registry entries from tools using common system application programming interfaces (APIs). What's New ======================================================================== a. RootkitBuster now works on computers running Microsoft Windows 10. b. New enhancements now prevent some known scanning errors. Click here to visit the author's website.
5/5 3,122 Dec 01, 2019
Trend Micro Inc.
   
 
Showing rows 1 to 8 of 8 Showing Page 1 of 1  1 


Copyright (c) 2020


Tweets by @GeekOnTheLoose