Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Pinned: Download Hiren’s BootCD 15.1
All in One Bootable CD which has all these utilities Antivirus Tools Avira AntiVir Personal (07-12-2011) Free anti-virus and anti-spyware on-demand scanner, detects and removes more than 50000 viruses and trojans. ClamWin Free Antivirus 0.97.3 (07-12-2011) A free antivirus, GNU GPL Open Source Virus Scanner. ComboFix (07-12-2011) Designed to cleanup malware infections and restore settings modified by malware. Dr.Web CureIt! Antivirus a free standalone anti-virus and anti-spyware on-demand scanner (downloadable). GMER 1.0.15 Hidden services, hidden registry, hidden file scanner, Rootkit Detector and Remover. Malwarebytes Anti-Malware 1.51.1 (07-12-2011) anti-malware application that can thoroughly remove even the most advanced malware. Remove Fake Antivirus 1.82 a tool to remove virus/malware which disguises itself to be an antivirus and produces fake alert/warnings and urge you to purchase a useless copy of the fake antivirus. RootkitRevealer 1.7.1 Rootkit Revealer is an advanced patent-pending root kit detection utility. Spybot - Search & Destroy 1.6.2 (07-12-2011) Application to scan for spyware, adware, hijackers and other malicious software. SuperAntispyware 5.0.1134 (07-12-2011) Remove Adware, Malware, Parasites, Rootkits, Spyware, Trojan, and Worms (a must have tool). TDSSKiller 2.6.21.0 To remove malware belonging to the family Rootkit.Win32.TDSS aka Tidserv, TDSServ and Alureon. Backup Tools CloneDisk 1.9.6 All in one tool for MBR, Partition, Disk, VMWare Disk images vmdk/vmx/vhd, and much more. COPYR.DMA Build013 A Tool for making copies of hard disks with bad sectors. CopyWipe 1.14 Copy old hard drive to a new hard drive by copying the entire contents of one drive to another, CopyWipe can also help prevent confidential or private data from being recovered, by securely wiping the contents of a drive. DiskImage 1.6 Creates and writes disk images files to hard and floppy disks. DriveImage XML 2.30 backup any drive/partition to an image file, even if the drive is currently in use, a very good freeware alternative to Ghost / Acronis Drive SnapShot 1.40 creates an exact Disk Image of your system into a file while ...
5/5 7,374 Mar 31, 2012
Hiren
Pinned: Hiren’s BootCD PE x64 v1.0.1
Hiren’s BootCD PE x64 v1.0.1 This download may trigger a virus warning. This is a false warning. This happens because of some of the advanced tools in this disk image. Statement from Hirensbootcd.org: The old versions you download from our website are NOT edited, they are the original files. Both old and new versions are clean. The most common files we are getting reports are “HBCDMenu.exe, HBCDCustomizer.exe, R-Kill.com, konboot.gz”. Please note, they do NOT contain a virus. If you are getting a virus warning, that is a false positive. Please report the file as a false positive via your antivirus software. During that time, you should disable your antivirus or add the related file to your antivirus software’s exceptions list for a problem free use. Hiren’s BootCD PE (Preinstallation Environment) is an emergency boot disk based on Windows 10 PE x64. It is being developed for the new age computers, it supports UEFI booting and requires minimum 2 GB RAM. It does not contain any pirated software, it is %100 free and legal. After boot, it finds and installs many common drivers like graphics, sound, wireless and ethernet card for your hardware. So that you can connect to a WIFI or Ethernet network. With the useful tools inside of the CD, you can solve many problems related with your computer. BCD-MBR Tools BootIce v1.3.3 EasyBCD v2.3 Hard Disk Tools – Data Recovery CheckDisk GUI v1.2.0 Lazesoft Data Recovery v4.0.0.1 Puran Data Recovery v1.2.0 Puran File Recovery v1.2.0 Recuva v1.53.0.1087 Runtime GetDataBack for FAT v4.3.3 Runtime GetDataBack for NTFS v4.3.3 Runtime GetDataBack Simple v5.0.0 Runtime NAS Data Recovery v4.0.0 Runtime RAID ...
5/5 571 Jun 21, 2018
hirensbootcd.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HBCDPE1_th.png"border="0">
Pinned: Malwarebytes Anti-Malware 3.5.1.2522
Malwarebytes Anti-Malware 3.5.1.2522 Malwarebytes 3.0. Four layers of malware-crushing tech. Smarter detection. Specialized ransomware protection. It's the security you’ve been looking for. What it does for you Malwarebytes Premium protects you from advanced threats Protects you from advanced threats Detects and removes malware in real-time with advanced anti-malware, anti-spyware, and anti-rootkit technology. Scans for the newest and most dangerous threats automatically, so you’re protected without having to even think about it. Malwarebytes Premium protects your files from being locked and held for ransom Protects your files from being locked and held for ransom Stops unknown and known ransomware with proprietary next-gen technology that works proactively to shield your files. This is a powerful, comprehensive defense that blocks ransomware, and not a simple decryption tool. So you’re protected from tomorrow’s “Ransomware Attack!” headlines today. Malwarebytes Premium Prevents your programs from being used against you Prevents your programs from being used against you Wraps your browser and software programs in four layers of defense, stopping attacks that use vulnerabilities in those programs to infect your computer. Malwarebytes Premium protects you from fake and infected websites Protects you from fake and infected websites Detects and prevents contact with fake websites and malicious links. You are proactively protected from downloading malware, hacking attempts, and infected advertising. Worried about wandering into a “bad” Internet neighborhood? Now you don’t have to be. Malwarebytes Premium scans faster, scans smarter Scans faster, scans smarter Lightning-fast Hyper Scan mode targets only the threats that are currently active. Faster analysis. Still gets results. Run a scan in the background while you boot up your favorite game. It's done by the time you're ready to play. Full protection or simple disinfection? Download Malwarebytes 3.0 for free and you get 14 days of full real-time protection. After the 14 days are up, Malwarebytes 3.0 reverts to a very limited but still free version that will only disinfect your computer after an attack. ...
5/5 8,138 Jun 04, 2018
Malwarebytes.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/malwarebytes1a_th.png"border="0">
FileASSASSIN 1.06
FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
5/5 4,208 Nov 12, 2016
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/FileAssassin1_th.png"border="0">
Junkware Removal Tool 8.1.4
Junkware Removal Tool 8.1.4 Scrubs out the bad, keeps the good Is your PC running slow? It could be infected with potentially unwanted programs (PUPs), adware, or other junkware. Junkware Removal Tool (JRT) by Malwarebytes sweeps up and removes all traces of irritating hitchhikers. How it works for you Removes adware that spawn popup ads, such as Conduit Uninstalls unwanted toolbars and browser helper objects, including the Ask and Babylon toolbars Removes potentially unwanted programs (PUPs) Cleans up traces left behind by PUPs What it does for you Toolbar removal functionality Browser extension removal functionality (Google Chrome, Firefox, Internet Explorer) PUPs and adware removal functionality Light footprint Portable application—no installation necessary What makes Junkware Removal Tool different? Offers comprehensive junkware removal Junkware Removal Tool is custom built to detect and remove over 250 junkware variants, including adware and unwanted toolbars. Moves with you Junkware Removal Tool is portable. There’s no need to install it on your computer—simply load it on a USB, plug the USB into your computer, and start cleaning. Combines fast scanning with seamless removal Got coffee? Junkware Removal Tool will typically disinfect a computer in under five minutes, so your machine is clean and pristine in the time it takes you to brew another cup. Spells simplicity “CLI” Junkware Removal Tool operates through a lean but flexible Command Line Interface (CLI) to reduce its system footprint and simplify operation. Maintains a low profile Junkware Removal Tool self-extracts and installs itself in the Temp folder. It’s unobtrusive, out of the way, and is easy to remove when the job is done. Tech Specs Version 8.1.4 Languages Available English Hardware Requirements 1024MB of RAM (256MB for Windows XP) ...
5/5 6,784 Jul 17, 2017
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/JRT_th.png"border="0">
Malwarebytes AdwCleaner 7.2.4.0
Malwarebytes AdwCleaner 7.2.4.0 AdwCleaner is a free removal tool for : Adware (ads software) PUP/LPI (Potentially Undesirable Program) Toolbars Hijacker (Hijack of the browser's homepage) It comes with both "Scan" and "Clean" mode. It can be easily uninstalled using the "Uninstall" button. Compatible with Windows 7, 8, 8.1, 10 in 32 &amp; 64 bits. 7.2.4.0 · AdwCleaner New Features Changes Bugfixes Fix a crash when the basic repair is run when no results have been found. Fix specific registry detections Improve upgrade mechanism reliability
5/5 13,209 Sep 07, 2018
Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ADWCleaner_th.png"border="0">
Malwarebytes Anti-Exploit 1.12.1.109
Malwarebytes Anti-Exploit 1.12.1.109 Malwarebytes Anti-Exploit protects you against the security vulnerabilities in the code, which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit protects you from these vulnerabilities which people can manipulate in order to infect your system with malware. The software gives you three layers of security protection around popular browsers and applications, thereby preventing the vulnerable code from being exploited. The software is not an antivirus product in itself, but it is compatible with most antivirus software. KEY FEATURES INCLUDE It protects browsers and their add-ons Protects browser components Protects media players and PDF readers Allows you to manage custom shields Best of all, it's free! Changelog We're happy to announce the release of Malwarebytes Anti-Exploit Beta 1.12 Build 109. This is a full Beta version with premium features available to Free users: Stability/issues fixed: Fixed False positives with Grammarly Add-in Fixed false positives with Edge browser Improvements in Exclusion capability Improvements in Detection Information and Telemetry Fixed page freeze issues with Browsers Fixed slowness issues with Adobe Acrobat Reader
5/5 4,375 Aug 10, 2018
Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/malwarebytes-anti-exploit-free-main-window_th.png"border="0">
Malwarebytes Anti-Malware for Android 1.00.0.0400
Malwarebytes Anti-Malware for Android 1.00.0.0400 The world’s most popular anti-malware technology has now gone mobile! Malwarebytes Anti-Malware Mobile protects your phone or tablet from malware, infected apps, and unauthorized surveillance. Malwarebytes Anti-Malware Mobile Detects and eliminates malware, including spyware and Trojans Scans your apps for malicious code Stops unauthorized access to your personal data Scans your Android device for security vulnerabilities Identifies applications that are tracking your location Take your anti-malware protection to go Malwarebytes Anti-Malware Mobile guards your identity and personal data on-the-go. So you and your Android smartphone or tablet are safe from malware and unauthorized surveillance. Wherever you are. Whenever you go. Make your smartphone smarter Is that app or downloaded photo safe? With Malwarebytes Anti-Malware Mobile, you never have to worry again. Powerful anti-malware and anti-spyware technology protects your Android device. Detecting Trojans, spyware, and other malware before they can steal your identity or eavesdrop. Choose what you keep private Cybercriminals, and even legitimate companies, can collect private information from your Android device. Where you go. Who your contacts are. Malwarebytes Anti-Malware Mobile identifies what your applications are doing, and which private information is being accessed. So you can control who knows, and what they know. Close the security holes Malwarebytes Anti-Malware Mobile automatically recognizes security vulnerabilities in your Android device’s settings. Then it makes recommendations on how to close those holes. Make your smartphone lighter Mobile security software is typically bloated with location features (Remote Lock, Locate on a Map, etc.). Features that can already be found on your Android Device Manager. Malwarebytes Anti-Malware Mobile preserves your device’s performance by adding only the necessary security features. Anti-Malware/Anti-Spyware Proactively scans applications and files for malware and spyware Scans native memory and SD card Schedules automatic scans Updates the protection database automatically Privacy Manager Identifies every application’s access privileges in detail Breaks down access privileges by category: Contacts, Identity Information, Simple Message Service (SMS), and Security Settings Security Audit Identifies security vulnerabilities on ...
0/5 5,406 Nov 09, 2013
Malwarebytes Corporation
Malwarebytes Anti-Ransomware beta9 - build 0.9.18.807
Malwarebytes Anti-Ransomware beta9 - build 0.9.18.807 Malwarebytes Anti-Ransomware uses advanced proactive technology that monitors what ransomware is doing and stops it cold before it even touches your files. It has no shot at encrypting. And it does not rely on signatures or heuristics, so it’s light and completely compatible with antivirus. These methods proved to be so successful at stopping ransomware that Malwarebytes Anti-Ransomware detected all of the latest and most dangerous ransomware variants right out of development and into beta 1. This means when running Malwarebytes Anti-Ransomware, you do not have to worry about getting infected by CryptoLocker, CryptoWall, or CTBLocker. Better yet, it can defeat new ransomware the moment it is released, proactively protecting you from ransomware that’s never even been seen before. Malwarebytes Anti-Ransomware open beta starts today and is available for anyone to install and try out. Please keep in mind that this is the first beta and there may be some bugs or issues that need to be worked out, so we encourage you to try it out in a non-production environment first.
5/5 1,255 Sep 21, 2017
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/MalwarebytesAntiRansomware1_th.png"border="0">
Malwarebytes Anti-Rootkit 1.10.3.1001
Malwarebytes Anti-Rootkit 1.10.3.1001 Malwarebytes Anti-Rootkit is a handy and reliable application designed to scan, detect and clean malicious rootkits that reside on your computer. The archive also includes a handy utility that repairs the damage caused by the presence of rootkits. This operation requires a reboot in order to apply the fixes.
5/5 4,336 Nov 02, 2017
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Malwarebytes-Anti-Rootkit_1_th.png"border="0">
Malwarebytes Chameleon 3.1.33
Malwarebytes Chameleon 3.1.33 Malwarebytes Chameleon technologies gets Malwarebytes Anti-Malware installed and running even when blocked by malicious programs. This program contains all up-to-date versions of Malwarebytes Anti-Malware. There are certain variants of malware that are designed to stop security programs from being installed and run on infected systems. Simply put, Chameleon is a tool that disguises Malwarebytes Anti-Malware (MBAM) so it can avoid the active infection designed to stop it allowing MBAM to be installed and run. Chameleon will also kill any known bad processes that are actively stopping MBAM from installing or running. If at any time your machine is infected and you try and install MBAM but you are unable to do so, or if you already have the program installed and try to run it but you are unable to do so, then it could be an infection preventing the installation or execution of the program. This is when Chameleon should be deployed, Chameleon will install its own driver and start to run, it will update MBAM to the latest definitions, (if already installed), kill any known malicious processes that are preventing MBAM from being installed or run, it will then launch MBAM automatically and a scan will begin.
5/5 3,131 Jan 02, 2017
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/chameleon2_th.png"border="0">
Malwarebytes Cleanup Utility 3.1.0.1035
Malwarebytes Cleanup Utility 3.1.0.1035 Remove all traces of Malwarebytes from your computer. To uninstall Malwarebytes Anti-Malware from your computer, please use our Malwarebytes Clean Uninstall Tool, mbam-clean.exe. This tool was created to completely remove all traces of the program from your computer. To use the utility: Download and run mbam-clean.exe Restart your computer when prompted. Note: This tool will completely remove any settings you have configured, your license information, and anything else related to Malwarebytes Anti-Malware. If you need to save any of these, please do not run this tool.
5/5 820 Mar 21, 2018
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/MalwarebytesCleanUninstallTool1_th.png"border="0">
Malwarebytes FileASSASSIN 1.06
Malwarebytes FileASSASSIN 1.06 FileASSASSIN can eradicate any type of locked files from your computer. If you use a computer, you've probably come across at least one of the following messages: Cannot delete file: Access is denied Make sure the disk is not full or write-protected and that the file is not currently in use The source or destination file may be in use The file is in use by another program or user These messages commonly appear when you're trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the file, FileASSASSIN can remove it Advanced programming techniques unload modules, close remote handles, and terminate processes in order to remove the particular locked file. Warning: Please use caution with FileASSASSIN as deleting critical system files may cause system errors. Usage Start FileASSASSIN and select a file by dragging it onto the text area or selecting it using the (...) button. Select a removal method from the list Click Execute and the removal process will commence
5/5 1,150 Feb 02, 2016
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/FileASSASSIN1_th.png"border="0">
Malwarebytes RegASSASSIN 1.00.0003
Malwarebytes RegASSASSIN 1.00.0003 RegASSASSIN can eradicate any registry key or value from your computer Malware often deposits parasitic registry keys into your system registry, exposing your computer to infection and corruption. These keys can be very difficult to remove... until now. RegASSASSIN removes malware placed registry keys into two simple steps - just reset the permissions and delete! This powerful and portable application makes hard-to-remove registry keys a thing of the past. Warning: Please use caution as deleting critical registry keys may cause system errors. Usage Download RegASSASSIN from the link above Double click on RegASSASSIN.exe Enter the registry key you wish to remove or reset and click Delete
5/5 403 Mar 29, 2018
Malwarebytes <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RegAssassin1_th.png"border="0">
PE-sieve 0.1.4.3 32bit
PE-sieve 0.1.4.3 32bit PE-sieve is a light-weitht tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches. Detects inline hooks, Process Hollowing, Process Doppelgänging, Reflective DLL Injection, etc. Usage It has a simple, commandline interface. When run without parameters, it displays info about the version and required arguments: When you run it giving a PID of the running process, it scans all the PE modules in its memory (the main executable, but also all the loaded DLLs). At the end, you can see the summary of how many anomalies have been detected of which type. In case if some modified modules has been detected, they are dumped into a folder of a given process, for example: JSON report specifies where the implants were found: Detailed characteristics of the suspicious indicators are given in the JSON report, that is dumped into the same folder. Short history &amp; features from the author Detecting inline hooks and patches I started creating it for the purpose of searching and examining inline hooks. You can see its initial version here: With time its precision and abilities significantly improved, and hooking detection is only one of many features of this tool. In case if the code of the original executable was patched in memory, additionally to the main JSON report, PE-sieve generates a TAG file. Its purpose is to describe at which offset a patch has been found, and of what type (either a patch, or a hook/redirection). We can easily see what function has been hooked and where the redirection leads to. The file that was patched is also dumped on the disk, so that we can examine it more closely under a dissembler. The TAG file can ...
5/5 13 Sep 13, 2018
Hasherezade <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PE-sieve1_th.png"border="0">
PE-sieve 0.1.4.3 64bit
PE-sieve 0.1.4.3 64bit PE-sieve is a light-weitht tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches. Detects inline hooks, Process Hollowing, Process Doppelgänging, Reflective DLL Injection, etc. Usage It has a simple, commandline interface. When run without parameters, it displays info about the version and required arguments: When you run it giving a PID of the running process, it scans all the PE modules in its memory (the main executable, but also all the loaded DLLs). At the end, you can see the summary of how many anomalies have been detected of which type. In case if some modified modules has been detected, they are dumped into a folder of a given process, for example: JSON report specifies where the implants were found: Detailed characteristics of the suspicious indicators are given in the JSON report, that is dumped into the same folder. Short history &amp; features from the author Detecting inline hooks and patches I started creating it for the purpose of searching and examining inline hooks. You can see its initial version here: With time its precision and abilities significantly improved, and hooking detection is only one of many features of this tool. In case if the code of the original executable was patched in memory, additionally to the main JSON report, PE-sieve generates a TAG file. Its purpose is to describe at which offset a patch has been found, and of what type (either a patch, or a hook/redirection). We can easily see what function has been hooked and where the redirection leads to. The file that was patched is also dumped on the disk, so that we can examine it more closely under a dissembler. The TAG file can ...
5/5 16 Sep 13, 2018
Hasherezade <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PE-sieve1_th.png"border="0">
Tron 10.6.0
Tron 10.6.0 Tron is a glorified collection of batch files that automate the process of disinfecting and cleaning up Windows systems. It is built with heavy reliance on community input and updated regularly. Tron supports all versions of Windows from XP to 10 (server variants included). What is "Tron Script"? Tron is a script that "fights for the User". It's basically a glorified collection of Windows batch files that automate a bunch of scanning/disinfection/cleanup tools on a Windows system. I got tired of running the utilities manually and decided to just automate everything. I hope this helps other techs, admins, and users in general. Tron's goal is to take a badly-running Windows system (bloated, infected, etc) and automate ~85% of the work involved in disinfecting it, removing bloatware, and basically cleaning everything up to get it running well again. That's pretty much it. At this point it seems to accomplish that goal pretty well on most systems. The whole project is built with heavy reliance on community input and updated regularly. Stages of Tron: Prep: rkill, ProcessKiller, TDSSKiller, Stinger, registry backup, WMI repair, sysrestore clean, oldest VSS set purge, create pre-run System Restore point, SMART disk check, NTP time sync Tempclean: TempFileCleanup, CCLeaner, BleachBit, backup &amp; clear event logs, Windows Update cache cleanup, Internet Explorer cleanup, USB device cleanup De-bloat: remove OEM bloatware; customizable list is in esources\stage_2_de-bloat\oem\; Metro OEM debloat (Win8/8.1/2012 only) Disinfect: Kaspersky Virus Removal Tool, Sophos Virus Removal Tool, Malwarebytes Anti-Malware, DISM image check (Win8/2012 only) Repair: Registry permissions reset, Filesystem permissions reset, SFC /scannow, chkdsk (if necessary) Patch: Updates 7-Zip, Java, and Adobe Flash/Reader and disables nag/update screens (uses some of our PDQ packs); then installs any pending Windows updates Optimize: ...
5/5 609 Sep 17, 2018
vocatus <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Tron Script1_th.png"border="0">
   
Showing rows 1 to 17 of 17 Showing Page 1 of 1  1 


PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0805 seconds


Tweets by @GeekOnTheLoose