A tool for removing PUPs using signatures

Related tags

Miscellaneous python
Overview

Unwanted program removal tool

A tool for removing PUPs using signatures

What is the unwanted program removal tool?

The unwanted program removal tool is a free and open source tool for removing PUPs, which are often missed by antimalware products

How do I install it?

The unwanted program removal tool does not require installation; you just need to download and run it.

Linux

Download the ZIP of this repo and unzip it.
Open Terminal (or another command line tool) and type cd and then the directory you extracted it to.
Run it using Python.
If you get an error, verify that you have Python 3 installed, and run pip3 install requests

Windows

Download the ZIP of this repo and unzip it.
Copy the directory where you extracted it to (open it in Explorer and verify scanner.py is in that directory if you are unsure)
Type cmd into the Windows search bar. Right click on Command Prompt and click Run as admin or Run as administrator. Confirm in the UAC.
Type python3 --version. If you get an error, download and install it from python.org
Type cd and then paste the directory you extracted to, and then type python3 scanner.py

You might also like...
HPomb Is Socail Engineering Tool , Used For Bombing , Spoofing and Anonymity Available For Linux And Android(Termux)
HPomb Is Socail Engineering Tool , Used For Bombing , Spoofing and Anonymity Available For Linux And Android(Termux)

HPomb v2020.02 Coming Soon Created By Secanonm HPomb Is Socail Engineering Tool , Used For Bombing , Spoofing and Anonymity Available For Linux And An

Tool to generate wrappers for Linux libraries allowing for dlopen()ing them without writing any boilerplate

Dynload wrapper This program will generate a wrapper to make it easy to dlopen() shared objects on Linux without writing a ton of boilerplate code. Th

A Sophisticated And Beautiful Doxing Tool

Garuda V1.1 A Sophisticated And Beautiful Doxing Tool Works on Android[Termux] | Linux | Windows Don't Forget to give it a star ❗ How to use ❓ First o

Subcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.
Subcert is an subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.

Subcert Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Table of contents Setup Demo

Oppia is an online learning tool that enables anyone to easily create and share interactive activities
Oppia is an online learning tool that enables anyone to easily create and share interactive activities

Oppia is an online learning tool that enables anyone to easily create and share interactive activities (called 'explorations'). These activities simulate a one-on-one conversation with a tutor, making it possible for students to learn by doing while getting feedback.

Simple Python tool to check if there is an Office 365 instance linked to a domain.

o365chk.py Simple Python script to check if there is an Office365 instance linked to a particular domain.

PyDy, short for Python Dynamics, is a tool kit written in the Python
PyDy, short for Python Dynamics, is a tool kit written in the Python

PyDy, short for Python Dynamics, is a tool kit written in the Python programming language that utilizes an array of scientific programs to enable the study of multibody dynamics. The goal is to have a modular framework and eventually a physics abstraction layer which utilizes a variety of backends that can provide the user with their desired workflow

Just some mtk tool for exploitation, reading/writing flash and doing crazy stuff

Just some mtk tool for exploitation, reading/writing flash and doing crazy stuff. For linux, a patched kernel is needed (see Setup folder) (except for read/write flash). For windows, you need to install zadig driver and replace pid 0003 / pid 2000 driver.

💉 🔍 VaxFinder - Backend The backend for the Vaccine Hunters Finder tool.

💉 🔍 VaxFinder - Backend The backend for the Vaccine Hunters Finder tool. Development Prerequisites Python 3.8 Poetry: A tool for dependency manageme

Comments
  • Detects things in C:\$Recycle.Bin as Threat.Trojan.ImpHash

    Detects things in C:\$Recycle.Bin as Threat.Trojan.ImpHash

    For example:

    PS C:\Users\JJTech\Downloads\unwanted-program-removal-tool-main\unwanted-program-removal-tool-main> py .\scanner.py
    ------ The Unwanted Program Removal tool ------
    Created by iam-py-test
    480 total signatures and heuristic rules
    Version 0.5
    -----------------------------------------------
    
    Enter to dir to scan: C:\
    File desktop.ini in C:\$Recycle.Bin\S-1-5-18 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File desktop.ini in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1000 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File desktop.ini in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1001 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I04J3EI.idea in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I0ZH908.java in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I0ZI9B5 in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I1I7Y0G in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I34F85M in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I5XH9HW in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I5ZLNP9.lnk in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I87QHBM in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I9OY2JN in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $I9Y23JJ in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IA34IMA.lnk in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IAJMU51.lnk in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IBJ5GEN.gitignore in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IBKBHRH in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IBQEJGM.lnk in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IBU6KAE.java in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n): n
    File $IDERZVX in C:\$Recycle.Bin\S-1-5-21-1999756017-3706530499-2194137631-1006 is detected as Heuristics: Threat.Trojan.ImpHash
    Remove (y/n):
    

    Obviously this is a false positive.

    opened by JJTech0130 8
Owner
I am a programmer/security researcher (in my spare time) who likes making filter lists and building antimalware engines
null
A flexible free and unlimited python tool to translate between different languages in a simple way using multiple translators.

deep-translator Translation for humans A flexible FREE and UNLIMITED tool to translate between different languages in a simple way using multiple tran

Nidhal Baccouri 806 Jan 4, 2023
tetrados is a tool to generate a density of states using the linear tetrahedron method from a band structure.

tetrados tetrados is a tool to generate a density of states using the linear tetrahedron method from a band structure. Currently, only VASP calculatio

Alex Ganose 1 Dec 21, 2021
Schemdule is a tiny tool using script as schema to schedule one day and remind you to do something during a day.

Schemdule is a tiny tool using script as schema to schedule one day and remind you to do something during a day. Platform Python Install Use pip: pip

StardustDL 4 Sep 13, 2021
A tool to guide you for team selection based on mana and ruleset using your owned cards.

Splinterlands_Teams_Guide A tool to guide you for team selection based on mana and ruleset using your owned cards. Built With This project is built wi

Ruzaini Subri 3 Jul 30, 2022
A tool for study using pomodoro methodology, while study mode spotify or any other .exe app is opened and while resting is closed.

Pomodoro-Timer-With-Spotify-Connection A tool for study using pomodoro methodology, while study mode spotify or any other .exe app is opened and while

null 2 Oct 23, 2022
Hashcrack: Hash Bruteforse tool using python

HashCrack Hash Bruteforse tool Usage hashcrack.py -n 6 -c lower -l 5 -a md5 -t 3

Lev 1 May 4, 2022
You can easily send campaigns, e-marketing have actually account using cash will thank you for using our tools, and you can support our Vodafone Cash +201090788026

*** Welcome User Sorry I Mean Hello Brother ✓ Devolper and Design : Mokhtar Abdelkreem ========================================== You Can Follow Us O

Mo Code 1 Nov 3, 2021
Run CodeServer on Google Colab using Inlets in less than 60 secs using your own domain.

Inlets Colab Run CodeServer on Colab using Inlets in less than 60 secs using your own domain. Features Optimized for Inlets/InletsPro Use your own Cus

null 2 Dec 30, 2021
Research using python - Guide for development of research code (using Anaconda Python)

Guide for development of research code (using Anaconda Python) TL;DR: One time s

Ziv Yaniv 1 Feb 1, 2022