Top 15 TDSSKiller Alternative and Similar Softwares | Mar 2024

Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits.

1. GMER

GMER GMER is an application that detects and removes rootkits .It scans for:- hidden processes- hidden threads- hidden modules- hidden services- hidden files- hidden Alternate Data Streams- hidden registry keys- drivers hooking SSDT- drivers hooking IDT- drivers hooking IRP calls- inline hooks"all your rootkits are belong to us" - gmer.net......

2. SpyDllRemover

SpyDllRemover SpyDllRemover is the specialized tool for detecting spyware & hidden Rootkit Dlls in the System. It can also detect & remove user-land Rootkit processes as well as other spyware processes using multiple [user-land] Rootkit detection algorithms coupled with in-house Process heuristics. This makes it a generic tool for detecting &......

3. Malwarebytes Anti-Rootkit

Malwarebytes Anti-Rootkit Malwarebytes Anti-Rootkit BETA drills down and removes even deeply embedded rootkitsMalwarebytes Anti-Rootkit BETA is cutting edge technology fordetecting and removing the nastiest malicious rootkitsUsage Download Malwarebytes Anti-Rootkit from the link above Run the file and follow the onscreen instructions to extract it to a location of your choosing (your desktop......

4. IceSword

IceSword IceSword - Rootkit Indentification SoftwareThis is a very powerful tool for detecting rootkits . Meant for advanced windows users or hackers. Originally written in Chinese.......

5. Rootkit Hunter

Rootkit Hunter Rootkit Hunter is a Linux scanner for rootkits, backdoors and local exploits by running tests like:- MD5 hash compare- Look for default files used by rootkits- Wrong file permissions for binaries- Look for suspected strings in LKM and KLD modules- Look for hidden files- Optional scan within plaintext and binary......

6. Cezurity Antivirus Scanner

Cezurity Antivirus Scanner Cezurity Antivirus Scanner is a Cloud Antimalware on-demand scanner that can scan and detect all kinds of malicious software - including viruses, Trojans, spyware, rootkits and even previously unknown threats (zero-day) - that may be installed in your system. Cezurity's accuracy of detection of active malware is often higher than......

7. Trend Micro RootkitBuster

Trend Micro RootkitBuster Scan for hidden files, registry entries, processes, services, drivers, kernel code patches, ports, operating system service hooks, and Master Boot Record (MBR) rootkits. Clean or remove hidden files, registry entries, and services.More social network pages:LinkedIn: https://www.linkedin.com/company/trend-micro......

8. RogueKiller

RogueKiller RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …......

9. United States Air Force Research Lab Encryption Wizard

United States Air Force Research Lab Encryption Wizard Encryption Wizard (EW) is a simple, strong, Java file and folder encryptor for protection of sensitive information. EW encrypts all file types for data-in-transit protection and supplements data-at-rest protection. Without requiring installation or elevated privileges, EW runs on Windows, Mac, Linux, Solaris, and any other computers with Standard Edition Java.......

10. Ghostpress

Ghostpress Full system-wide key-press protectionDesktop widget or favicon12 Languages (Croatian, Czech, Dutch, English, French, German, Indonesian, Italian, Korean, Latvian, Polish and Spanish)Ultra-fast performanceProcess-protectionAnti low-level keylogger......

11. RoboForm

RoboForm RoboForm is a proprietary software password management program that syncs passwords between multiple computers. It offers a web form filler that automates password entering and form filling on Internet Explorer, Firefox, Chrome, and Safari, as well offering manager apps on mobile platforms like iOS, Android, Blackberry.The free version of Roboform......

12. F*

F* F* (pronounced F star) is an ML-like functional programming language aimed at program verification. Its type system includes polymorphism, dependent types, monadic effects, refinement types, and a weakest precondition calculus. Together, these features allow expressing precise and compact specifications for programs, including functional correctness properties. The F* type-checker aims to......

13. WipeFile

WipeFile WipeFile erases files and folders secure and fast. WipeFile overwrites the information completely, so there is no way to undelete the files or reconstruct the file content.......

14. WipeDisk

WipeDisk WipeDisk erases physical and logical disks (complete harddisks or single partition) secure and fast.WipeDisk overwrites the information sector-wise, from the first sector of the disk to the last one. This is particularly important for forensically correct deletion of data.WipeDisk supports 14 different wipe methods, e.g. two US Navy standards, the......

15. Disk Wipe

Disk Wipe Disk Wipe is Free, portable Windows application for permanent volume data destruction. With Disk Wipe you can erase all disk data and prevent recovery of those data. Formatting a hard drive with regular method leaves an open possibility to recover the data back. Many companies and users who just dumped......