Top 15 LOKI Free IOC Scanner Alternative and Similar Softwares | Apr 2024

Loki looks to be somewhat like Detekt, a free downloadable aimed at detecting evidence of state hacking, but more aimed at the corporate crowd, rather than activists.

Indeed, there is a full-featured commercial version, called Thor.

1. RogueKiller

RogueKiller RogueKiller is an anti-malware program written in C++ and able to detect and remove generic malwares and some advanced threats such as rootkits, rogues, worms, …......

2. Hitman Pro

Hitman Pro Hitman Pro is an on-demand malware scanner and removal tool. It will usually do a full-system scan significantly faster than other (traditional) solutions due to its cloud-based scan technique. It does not offer a real-time component (aka shield, guard) and will upload suspicious files to the cloud for scanning. Hitman......

3. Trend Micro RootkitBuster

Trend Micro RootkitBuster Scan for hidden files, registry entries, processes, services, drivers, kernel code patches, ports, operating system service hooks, and Master Boot Record (MBR) rootkits. Clean or remove hidden files, registry entries, and services.More social network pages:LinkedIn: https://www.linkedin.com/company/trend-micro......

4. Spybot - Search & Destroy

Spybot - Search & Destroy Spybot - Search & Destroy detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Free for private use. Companies and institutions need to buy licenses for the commercial versions of our software. There are two editions of Spybot S&D for non-private use:......

5. NoVirusThanks Malware Remover

NoVirusThanks Malware Remover Free malware remover for Windows. Easily detect and remove popular trojans, spyware and rogue security software from your computer. Easy to use interface.......

6. RRT Sergiwa Antiviral Toolkit

RRT Sergiwa Antiviral Toolkit Sergiwa Antiviral Toolkit is a set of handy tools that scan, remove malware and re-enables all what a virus had previously disabled (System Restrictions) and gives you back the control over your own computer, common behavior of a virus is to make some changes to the system restrictions in order......

7. DigiVault

DigiVault DigiVault is a portable, file-based encryption software for WindowsDigiVault helps you create and manage encrypted file containers or repositories for storing confidential files. To encrypt, simply drag and drop files or folders in the repository. To decrypt, just export the files or folders to your chosen storage location.DigiVault comes in......

8. Stellar Phoenix Server Password Recovery

Stellar Phoenix Server Password Recovery Stellar Phoenix Server Password Recovery uses ingenious methods to effortlessly reset the password of any Windows Server based system, which is configured to be the domain controller. Resets passwords meeting the norms of Windows server password policy Easy to use interface to facilitate smooth Windows server password recovery Available as......

9. Zemana AntiMalware

Zemana AntiMalware Zemana AntiMalware Free is an on demand malware scanner designed to clean your PC from all the infections that have taken place on your PC.......

10. Drag'n'Crypt ULTRA

Drag'n'Crypt ULTRA Drag'n'Crypt ULTRA is a small, coding program assistance whose you confidential data which can be served very simply against the access of unauthorized ones protect can. You draw the file (EN), which can be coded, simply on the program window (the drop zone) and DCU codes the file (EN) with......

11. Challenger

Challenger Challenger is a software for the encoding of files, folders and drives. For the installation and for the execution simple user rights suffice. Thereby the program is mobil usable on an USB flash drive too. The software is conceived for the local protection of data privacy and for closed communication......

12. ProxyCrypt

ProxyCrypt ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive.It works as a "proxy" for the ImDisk Virtual Disk Driver . Features:- Supports AES-256, Serpent and Twofish ciphers.- Mode of operation is XTS.- Passwords are hashed with the scrypt key derivation......

13. FreeFixer

FreeFixer FreeFixer is a general purpose removal tool which will help you to delete potentially unwanted software, such as adware, spyware, trojans, viruses and worms. FreeFixer works by scanning a large number of locations where unwanted software has a known record of appearing or leaving traces. The scan locations include the......

14. FileWall

FileWall FileWall is a encryption software based on transparent encryption (real-time encryption). The most distinctive feature of FileWall is "Realtime encryption". Based on this technology, users can more quickly access and modify encrypted files without decryption, unlike traditional encryption software needed to decrypt the entire file and then encrypt the entire......

15. Offline NT Password & Registry Editor

Offline NT Password & Registry Editor Windows stores its user information, including crypted versions of the passwords, in a file called 'sam', usually found in \windows\system32\config. This file is a part of the registry, in a binary format previously undocumented, and not easily accessible. But thanks to a German(?) named B.D, I've now made a program......