Your download link is at the very bottom of the page... always.

Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:

Buy our over-priced crap to help keep things running.

Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn

 Home » Freeware Downloads » Searching Files   
Search Results
  File Name Rating Downloads
Last Update/Developer
HijackThis 2.0.5
HijackThis 2.0.5 HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively remove items from your machine. In addition to this scan and remove capability HijackThis comes with several tools useful in manually removing malware from a computer. IMPORTANT: HijackThis does not determine what is good or bad. Do not make any changes to your computer settings unless you are an expert computer user. Advanced users can use HijackThis to remove unwanted settings or files.
5/5 7,662 Nov 13, 2019
HiJackThis Fork v2.10.0.23
HiJackThis Fork v2.10.0.23 The resurrection of one of our favorite virus/malware removal tools of all time! HiJackThis Fork is a modification (fork) of Trend Micro HiJackThis by Alex Dragokas (Stanislav Polshyn) and the team, and is distributed under open source code under the original GNU GPLv2 license. HiJackThis Fork is a tool that is able to detect and fix changes in the most vulnerable parts of the operating system made by adware, spyware, malware and other unwanted programs. HiJackThis verification is not based on blacklists, specific programs or URLs, but only on the methods used by adware ("browser hijackers") to redirect you to their websites. Therefore, the program does not need constant updates. As a minus, both legitimate and malicious objects are displayed in its results. Therefore, you can not delete everything in a row. This is quite guaranteed to harm the system. The assessment of the harmfulness of objects in the report should be carried out by an information security specialist or an experienced user. Click here to visit the author's website.
5/5 635 Sep 26, 2022
Alex Dragokas
Showing rows 1 to 2 of 2 Showing Page 1 of 1  1 Copyright (c) 2023

Tweets by @GeekOnTheLoose