Top 15 Rootkit Hunter Alternative and Similar Softwares | Apr 2024

Rootkit Hunter is a Linux scanner for rootkits, backdoors and local exploits by running tests like:

- MD5 hash compare
- Look for default files used by rootkits
- Wrong file permissions for binaries
- Look for suspected strings in LKM and KLD modules
- Look for hidden files
- Optional scan within plaintext and binary files

Rootkit Hunter is released as GPL licensed project and free for everyone to use.

1. Malwarebytes Anti-Rootkit

Malwarebytes Anti-Rootkit Malwarebytes Anti-Rootkit BETA drills down and removes even deeply embedded rootkitsMalwarebytes Anti-Rootkit BETA is cutting edge technology fordetecting and removing the nastiest malicious rootkitsUsage Download Malwarebytes Anti-Rootkit from the link above Run the file and follow the onscreen instructions to extract it to a location of your choosing (your desktop......

2. Ad-Aware

Ad-Aware [The Ad-Aware antimalware program has been replaced by Ad-Aware Free Antivirus+: Ad-Aware Free Antivirus+ ]Ad-Aware was an anti-malware program developed by Lavasoft that detects and removes spyware or adware on a users computer. It detected spyware, viruses, dialers, Trojans, bots, rootkits, data miners, aggressive advertising, parasites, browser hijackers,......

3. GMER

GMER GMER is an application that detects and removes rootkits .It scans for:- hidden processes- hidden threads- hidden modules- hidden services- hidden files- hidden Alternate Data Streams- hidden registry keys- drivers hooking SSDT- drivers hooking IDT- drivers hooking IRP calls- inline hooks"all your rootkits are belong to us" - gmer.net......

4. Cezurity Antivirus Scanner

Cezurity Antivirus Scanner Cezurity Antivirus Scanner is a Cloud Antimalware on-demand scanner that can scan and detect all kinds of malicious software - including viruses, Trojans, spyware, rootkits and even previously unknown threats (zero-day) - that may be installed in your system. Cezurity's accuracy of detection of active malware is often higher than......

5. Windows Defender

Windows Defender Windows Defender is built into Windows to help guard your PC against viruses, spyware, and other malicious software in real time. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against malware when it's detected, minimizes interruptions, and helps you stay productive.......

6. The Bit9 Security Platform

The Bit9 Security Platform The Bit9 Security Platform provides pro-active and customizable application control and endpoint threat prevention.The world’s most advanced and widely deployed application control solution.The Bit9 Security Platform is the industry’s most comprehensive endpoint threat protection solution and the world’s most widely deployed application whitelisting product. With a single agent, Bit9 continuously......

7. ThreatFire

ThreatFire ThreatFire, features innovative real-time behavioral protection technology that provides powerful standalone protection or the perfect complement to traditional signature-based antivirus programs.ThreatFires patent-pending ActiveDefense technology offers unsurpassed protection against both known and unknown zero-day viruses, worms, trojans, rootkits, buffer overflows, spyware, adware and other malware.......

8. Emsisoft Anti-Malware

Emsisoft Anti-Malware Emsisoft Anti-Malware, previously a-squared Anti-Malware, is an antivirus and antispyware protection suite developed by Emsi Software. Emsisoft Anti-Malware monitors all active programs in real time for dangerous behavior (Behavior Blocking) and can detect new unknown Trojans, Worms, Viruses and other damaging programs (Zero-Day dangers) without daily updates. The signature-based security......

9. Cyberark

Cyberark CyberArk proactively stops the most advanced cyber threats – those that exploit insider privileges to attack the heart of the enterprise.CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks......

10. Hitman Pro

Hitman Pro Hitman Pro is an on-demand malware scanner and removal tool. It will usually do a full-system scan significantly faster than other (traditional) solutions due to its cloud-based scan technique. It does not offer a real-time component (aka shield, guard) and will upload suspicious files to the cloud for scanning. Hitman......

11. TDSSKiller

TDSSKiller Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits.......

12. Panda Cloud Cleaner

Panda Cloud Cleaner Complete disinfection of malware other antivirus can't detect.- Greater detection capacity than traditional antivirus solutions thanks to its latest generation technologies.- Online detection of all types of malware, vulnerabilities and unknown threats.- Easy to use from your browser and always up-to-date against the latest threats.- A free report about threats......

13. RogueKiller

RogueKiller RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …......

14. Spybot - Search & Destroy

Spybot - Search & Destroy Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Free for private use. Companies and institutions need to buy licenses for the commercial versions of our software. There are two editions of Spybot S&D for non-private use:......

15. PC Matic

PC Matic The internet can be a scary place. There are online villains that exist solely to rob you of your identity, online bank accounts, and your self-esteem. The sad fact is that all security products on the market today, free or otherwise, do a poor job of protecting against the latest......