Top 15 Permissions Reporter Alternative and Similar Softwares | Apr 2024

Permissions Reporter allows you to quickly validate the current security posture of entire local and/or network file systems at once. All with multiple export formats, command-line support, built-in scheduling, and much more.

1. UFS Explorer Standard Recovery

UFS Explorer Standard Recovery UFS Explorer Standard Recovery was designed to make even complex data recovery a simple procedure to be easily carried-out by both home users and professionals. The software embraces powerful mechanisms that allow to recover accidentally deleted data and data lost due to logical file system damages after formatting hard disk,......

2. UFS Explorer RAID Recovery

UFS Explorer RAID Recovery UFS Explorer Standard Recovery for RAID (RCI) was designed as an extension to UFS Explorer Standard Recovery software to expand capabilities for reconstruction of complex RAID-systems and recovery of lost and deleted data from these systems. In addition to the set of functions contained in UFS Explorer Standard Recovery this......

3. UFS Explorer Standard Access

UFS Explorer Standard Access UFS Explorer Standard Access is a software application designed exclusively for cases when it's difficult or impossible to access not-damaged data on a physical storage, disk images or virtual disks of virtual machines. The software enables fast and easy access to blocked data. Supporting a great variety of operating systems......

4. UFS Explorer Professional Recovery

UFS Explorer Professional Recovery UFS Explorer Professional Recovery is a full-featured software application designed exclusively for data recovery specialists. The application successfully combines low-level data analysis and data management functions with high-level data recovery tools. UFS Explorer Professional Recovery is the only software of the UFS Explorer group that allows to alter original information......

5. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......

6. Lynis

Lynis Lynis is an open source security auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix based system (including Mac). Even the installation of the software itself is optional!How it worksLynis......

7. Hetman Partition Recovery

Hetman Partition Recovery Undelete files, unformat partitions and recover corrupted hard drives with easy step-by-step wizards. A single, all-in-one solution will take care of all your disk and data recovery needs. Hetman Partition Recovery can unerase deleted files and folders, recover files from formatted, corrupted, repartitioned and inaccessible storage media. In addition, Hetman......

8. DMDE

DMDE DM Disk Editor and Data Recovery (DMDE) is a disk editor which can help you to understand NTFS. Its capable to view your hard disk sector wise, on MFT level, to disect mft attributes and to edit bytes on your hard disk.Besides NTFS, it can handle other file systems such......

9. Samba

Samba Samba is the standard Windows interoperability suite of programs for Linux and Unix. Since 1992, Samba has provided secure, stable and fast file and print services for all clients using the SMB/CIFS protocol, such as all versions of DOS and Windows, OS/2, Linux and many others. Samba is an important......

10. Systweak Disk Analyzer Pro

Systweak Disk Analyzer Pro Disk Analyzer Pro is a useful tool that swiftly analyzes your disk space and demonstrates the usage of the disk in terms of file count, file size, created date, etc. It gives you an overview of each and every existing file on the disk in a categorized manner. With the......

11. NTFS-Search

NTFS-Search This tool enables users to search their NTFS formatted harddrives within seconds. It uses the MFT (master file table) of NTFS to search for files very fast.......

12. Retire.js

Retire.js The goal of Retire.js is to help you detect use of a JavaScript library version with known vulnerabilities.......

13. Stellar Drive ToolBox

Stellar Drive ToolBox Pack of 15 Mac tools to Clone Mac, Defrag Mac, Speedup Mac, Repair Disk, Resize Mac disk, Remove duplicates from Mac, Edit Mac disk info, Wipe sensitive data from Mac and maintain Mac hard drive.......

14. Compaas

Compaas Using the public cloud without Compaas is like driving without a seatbelt. 60% of companies fail after a data breach and employee negligence is the leading cause of data exposure. Compaas protects your cloud data against employee negligence and 3rd party apps. Small and medium-sized businesses are plagued with employee......

15. FolderSizes

FolderSizes FolderSizes provides an engaging, interactive disk space analysis experience that you must try yourself to truly appreciate. More than just a series of diverse reports, FolderSizes allows you to visualize your disk space usage from multiple perspectives, like SequoiaView.It employs a multi-threaded file system scanning engine that shows you results......