Alternatives to FileAlyzer
Compare FileAlyzer alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FileAlyzer in 2026. Compare features, ratings, user reviews, pricing, and more from FileAlyzer competitors and alternatives in order to make an informed decision for your business.
-
1
FinAlyzer
Beyond Square Solutions
FinAlyzer®, a unified digital platform for financial consolidation, financial close, analytics, and management reporting, acts as a catalyst for CFO reporting in multi-entity organizations, covering integrated group reporting, legal reporting, management consolidation & segment-wise profitability reporting. FinAlyzer effortlessly converts financial data to actionable insights with decision analytics, KPI’s, insights, predictive forecasting, and benchmarks. Its no code fully configurable with of the box accounting taxonomy for IFRS, Ind AS, US GAAP, IRDAI & MIS. FinAlyzer is all in one corporate performance management platform that brings together your financial and operational data seamlessly that frees time for report preparation and helps teams focus their time on analysis and better decision making. FinAlyzer is high-performance BI and CPM solution. -
2
RegAlyzer
Spybot
RegAlyzer is a tool to browse and change the registry. It was created because of a few features we missed in the original regedit tool, from support for exotic value types over the background and regular expression search to better bookmarks, displaying .reg files in the accustomed style, and a history view. RegAlyzer 2, currently available as a release candidate, will support a multi-tabbed interface, value interpretations, constant names for values, and snapshots of hives to track changes. RegAlyzer includes a database of some common registry locations including details that help interpret registry values, by providing constant names and descriptive texts. RegAlyzer allows you to track changes to your registry by comparing its current state against snapshots you have made. RegAlyzer 2 brings a new bookmark manager that offers hierarchical storage for bookmarks. RegAlyzer locates inactive hives on other drives and allows you to use the registry inside.Starting Price: €29.99 one-time payment -
3
TikAlyzer
TikAlzyer.AI
TikAlyzer.AI is an AI-powered video analysis tool designed to help creators optimize their TikTok, Instagram Reels, and YouTube Shorts content for maximum engagement. Users upload their videos or paste URLs and receive detailed feedback in under 30 seconds on why viewers drop off and how to improve retention. The platform analyzes over 50 factors such as hooks, timing, pacing, and audio quality, delivering a performance score from 0 to 100. It provides actionable recommendations like improving the opening hook, adding trending audio, or adjusting video length to boost views and engagement. Trusted by over 1,000 creators, TikAlyzer claims 95% accuracy in identifying retention drop-off points. A free first video analysis is offered with affordable subscription plans available for unlimited video reviews.Starting Price: $4.99 for 10 credits -
4
CampaignAlyzer
CampaignAlyzer
Tagging multiple campaigns used to be messy work. Now there’s a fast, organized solution that consistently tags, validates, and manages all your campaigns – so you can gain a competitive advantage. CampaignAlyzer is a cloud-based platform where digital marketers can store their marketing campaign parameters in one database. Now you can streamline your online and offline tagging for dependable performance and measurement. Ensure consistent naming conventions across every campaign. Guide future campaigns by referencing previous campaign parameters in an efficient, adaptive process. Confidently measure campaign performance in Google Analytics. CampaignAlyzer ensures consistent tagging. Previous values and campaigns can be referenced as a guide for future campaigns. Predefined mediums restrict rogue tagging. And only administrators can adjust the mediums list.Starting Price: $99 per month -
5
odix
odix
odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file. -
6
FileScan.IO
FileScan GmbH
FileScan.IO is a next-gen malware analysis platform with the following emphasis: - Providing rapid and in-depth threat analysis services capable of massive processing - Focus on Indicator-of-Compromise (IOC) extraction and actionable context Key Benefits - Perform detection and IOC extraction for all common files in a single platform - Rapidly identify threats, their capabilities and update your security systems - Search your corporate network for compromised endpoints - Analyze files at scale without actually executing them - Easy reporting for entry level analysts and executive summary - Easy deployment and maintenance We offer a free community service which is a free malware analysis service that offers rapid in-depth file assessments, threat intelligence and indicator of compromise (IOCs) extraction for a wide range of executable files, documents and scripts. -
7
Jotti
Jotti
Jotti's malware scan is a free service that lets you scan suspicious files with several anti-virus programs. You can submit up to 5 files at the same time. There is a 250MB limit per file. Please be aware that no security solution offers 100% protection, not even when it uses several anti-virus engines. All files are shared with anti-virus companies so detection accuracy of their anti-virus products can be improved. We are not interested in names, addresses, or other information providing insight into the identities of our visitors, but we do log and use some of the data you provide. We recognize that privacy is important and we want you to completely understand what happens with the information you send to us. We store files you send in for scanning and share these with anti-malware companies. We do this to help anti-malware companies improve the detection accuracy of their security products. We treat your files confidentially. -
8
Secure Malware Analytics (formerly Threat Grid) combines advanced sandboxing with threat intelligence into one unified solution to protect organizations from malware. With a robust, context-rich malware knowledge base, you will understand what malware is doing, or attempting to do, how large a threat it poses, and how to defend against it. Secure Malware Analytics rapidly analyzes files and suspicious behavior across your environment. Your security teams get context-rich malware analytics and threat intelligence, so they’re armed with insight into what a file is doing and can quickly respond to threats. Secure Malware Analytics analyzes the behavior of a file against millions of samples and billions of malware artifacts. Secure Malware Analytics identifies key behavioral indicators of malware and their associated campaigns. Take advantage of Secure Malware Analytics's robust search capabilities, correlations, and detailed static and dynamic analyses.
-
9
Cuckoo Sandbox
Cuckoo
You can throw any suspicious file at it and in a matter of minutes Cuckoo will provide a detailed report outlining the behavior of the file when executed inside a realistic but isolated environment. Malware is the swiss-army knife of cybercriminals and any other adversary to your corporation or organization. In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments. -
10
Avira Cloud Sandbox
Avira
The Avira Cloud Sandbox is an award-winning, unlimited-scale automated malware analysis service. It blends multiple advanced analysis technologies to deliver a complete threat intelligence report from an uploaded file. The Cloud Sandbox API delivers a detailed, file-specific, threat intelligence report. It contains valuable, actionable intelligence. The report has a detailed classification of the file, information on the techniques, tactics and procedures (IoCs) present in the threat, and a description of how and why the submitted file was identified as clean, malicious, or suspicious. Avira’s Cloud Sandbox leverages the technologies developed within the Avira Protection Cloud, the cloud security system that underpins the anti-malware and threat intelligence solutions of Avira. Through OEM technology partnerships we protect many of the world’s leading cyber-security vendors, and nearly a billion people world-wide. -
11
QFlow
Quarkslab
QFlow is an advance malware detection and analysis platform to reduce the risk of infection during file transfers. QFlow offers comprehensive detection methods and the customization and automation of processing chains to meet specific needs. QFlow integrates a suite of tools that allow advanced analysis of potentially malicious files: commercial antiviruses, commercial sandboxes, open source tools optimized with Quarkslab's expertise. The deployment modes offered, as well as the strict security requirements that apply to the solution, reduce the risk of data leakage. Use Cases: - detection of malware in files and URLs - advanced threat analysis for security engineers - simplified integration into IT infrastructure or business application chains via ICAP or APIs - removable device security through white stations Analysis: - Static analysis (4 AVs) - Dynamic analysis (VMRay) - Morphological analysis (Binary analysis by Cyber Detect's GORILLE) -
12
PT MultiScanner
Positive Technologies
PT MultiScanner provides multiple levels of anti-malware protection to detect and block infections on corporate infrastructure, uncover hidden threats, and facilitate investigation of malware-related security incidents. Counting on the same antivirus vendor to be right every time? Draw on the best anti-malware vendors and Positive Technologies expertise instead. Extensive integration support and scalability make PT MultiScanner the right choice for both startups and the largest corporations. Suspicious objects are scanned with multiple anti-malware engines, static analysis, and Positive Technologies reputation lists. The solution supports scanning of files and archives, including recursively compressed ones. As a result, PT MultiScanner can spot and block malware far more effectively than any one method used in isolation. -
13
FileWall
Odix
odix - a market leader in Enterprise CDR (Content Disarm and Reconstruction), is now offering FileWall, a native cybersecurity application for Microsoft Office 365 mailboxes for SMEs. FileWall™ is designed to run in conjunction with existing Microsoft security solutions such as EOP and ATP, ensuring complete prevention against unknown attacks delivered via email attachments. FileWall™ doesn’t harm/change any of Microsoft sender related security capabilities.Starting Price: $1 per user, per month -
14
Symantec Content Analysis
Broadcom
Symantec Content Analysis automatically escalates and brokers potential zero-day threats for dynamic sandboxing and validation before sending content to users. Analyze unknown content from one central location. Leveraging Symantec ProxySG, this malware analyzer uses a unique multi-layer inspection and dual-sandboxing approach to reveal malicious behavior and expose zero-day threats, and safely detonate suspicious files and URLs. Content Analysis delivers multi-layer file inspection to better protect your organization against known and unknown threats. Unknown or suspicious content from sources like ProxySG, messaging gateway, or other tools is delivered to Content Analysis for deep inspection, interrogation, analysis and ultimately blocking, if deemed malicious. Recent enhancements to Content Analysis strengthens this platform even further. -
15
Palo Alto Networks WildFire
Palo Alto Networks
WildFire® utilizes near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats, keeping your organization protected. Access advanced file analysis capabilities to secure applications like web portals, integrate with SOAR tools, and more. Incorporate WildFire’s unique malware analysis capabilities spanning multiple threat vectors resulting in consistent security outcomes across your organization via an API. Choose flexible file submission and query volumes as needed without requiring a next-generation firewall. Leverage industry-leading advanced analysis and prevention engine capabilities, regional cloud deployments, & unique network effect. WildFire combines machine learning, dynamic and static analysis, and a custom-built analysis environment to discover even the most sophisticated threats across multiple stages and attack vectors. -
16
Comodo Valkyrie
Comodo
Because Valkyrie analyzes the entire run-time behavior of a file, it is more effective at detecting zero-day threats missed by the signature-based detection systems of classic antivirus products. The Valkyrie console allows users to upload new files for analysis and to view scan results in a range of dashboards and reports. Users can also forward files to Comodo Labs for in-depth, human expert checks. The Comodo Unknown File Hunter tool allows users to locally scan entire networks for unknown files then upload them to Valkyrie for analysis. Valkyrie analysis systems consist of multiple techniques to ensure each and every file submitted is analyzed thoroughly before providing the verdict. In order to do that Valkyrie deploys two types of technologies - Automatic analysis and Human Expert analysis. -
17
VIPRE ThreatAnalyzer
VIPRE Security Group
VIPRE ThreatAnalyzer is a powerful dynamic malware analysis sandbox that helps you stay ahead of cyber threats. It lets you safely uncover how malware could impact your organization, so you can respond faster and smarter. Today’s most dangerous attacks often hide in legitimate-looking files—like executables, PDFs, or Microsoft Office documents—waiting for one wrong click to cause chaos, disrupt operations, and rack up financial damage. ThreatAnalyzer intercepts suspicious files, including ransomware and zero-day threats, and detonates them in a secure sandbox environment. Its machine-learning engine analyzes the threats, providing valuable insights into how attacks work, which systems are at risk, and how to strengthen defenses. Get inside the mind of attackers without compromising your network. With VIPRE ThreatAnalyzer, you’ll gain the knowledge to outsmart cybercriminals before they strike.Starting Price: $5400/year for 5q/day -
18
YARA
YARA
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determine its logic. YARA-CI may be a useful addition to your toolbelt. This is GitHub application that provides continuous testing for your rules, helping you to identify common mistakes and false positives. The above rule is telling YARA that any file containing one of the three strings must be reported as silent_banker. -
19
Deep Discovery Inspector
Trend Micro
Deep Discovery Inspector is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches. Organizations are increasingly becoming victims of targeted ransomware when advanced malware bypasses traditional security, encrypts data, and demands payment to release the data. Deep Discovery Inspector uses known and unknown patterns and reputation analysis to detect the latest ransomware attacks, including WannaCry. The customized sandbox detects mass file modifications, encryption behavior, and modifications to backup and restore processes. Security professionals are flooded with threat data coming from numerous sources. Trend Micro™ XDR for Networks helps prioritize threats and provide visibility into an attack. -
20
Falcon Sandbox
CrowdStrike
Falcon Sandbox performs deep analysis of evasive and unknown threats, enriches the results with threat intelligence and delivers actionable indicators of compromise (IOCs), enabling your security team to better understand sophisticated malware attacks and strengthen their defenses. Unique hybrid analysis technology detects unknown and zero-day exploits while defeating evasive malware. Uncover the full attack lifecycle with in-depth insight into all file, network, memory and process activity. Save time and make all security teams more effective with easy-to-understand reports, actionable IOCs and seamless integration. The most sophisticated analysis is required to uncover today’s evasive and advanced malware. Falcon Sandbox’s Hybrid Analysis technology exposes hidden behavior, defeats evasive malware and delivers more IOCs, to improve the effectiveness of the entire security infrastructure. -
21
OPSWAT MetaDefender
OPSWAT
MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.Starting Price: $0 -
22
NoDistribute
NoDistribute
Select your file in order to scan your file with over 35 anti-viruses. The results of the scans are never distributed. Feel free to create and use temporary mail addresses for free. For your own privacy and the privacy of your files, you may not want to share the contents of your files with the antivirus companies. We use an API from a reliable provider (VirusCheckMate) which has been around since 2014. If you are interested in their services, then you can find about more about them at VirusCheckMate.net. Since our launch in 2013 we have not distributed the results of a single scan. You're of course free to run your own tests on our service to verify that the results aren't distributed. Every day we receive thousands of views on previous scan results and new file scans. It is partially a free service as you receive 3 scans per day. We would however appreciate if you could support the service by purchasing a scan key. -
23
TEMASOFT FileMonitor
Temasoft
Track file access and monitor file copy operations on local and shared files, in real-time, with unrivaled accuracy! Our unique file monitoring technology goes beyond basic audit operations, like read, write, and attribute changed. It can record and deliver the entire context around complex activities like file copy (locally, over the network or on USB devices), file archived, file uploaded through browsers or attached to emails. Monitoring shares is now easier, and you can get a much better picture of what happens with your critical files. TEMASOFT FileMonitor is a versatile product that you can customize to suit your needs in the best manner (more information is available on the support page). Each item can show data independently, or you can combine items to display data using a drill-down approach. -
24
VirusTotal
VirusTotal
VirusTotal inspects items with over 70 antivirus scanners and URL/domain blocklisting services, in addition to a myriad of tools to extract signals from the studied content. Any user can select a file from their computer using their browser and send it to VirusTotal. VirusTotal offers a number of file submission methods, including the primary public web interface, desktop uploaders, browser extensions and a programmatic API. The web interface has the highest scanning priority among the publicly available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API. -
25
File Viewer Plus
File Viewer Plus
File Viewer Plus 4 opens over 400 file formats. View dozens of common file types, such as Office documents, PDFs, and image files, all with one program. Play hundreds of audio and video file formats with the built-in media player. Decompress archives with the file decompression tool. You can also open less common file formats with File Viewer Plus. View Microsoft Project and Visio documents. Open source code files with syntax highlighting. Open email attachments and downloads. If you have unknown files on your PC, try File Viewer Plus. Not only can you open hundreds of file formats with File Viewer Plus, you can also edit, save, and convert files. Edit a Word document and save it as a PDF. Crop a raw image from a digital camera and export it as a JPEG. Convert thousands of files at once with the built-in batch converter.Starting Price: $49.99 one-time payment -
26
Eye Of Gnome
Gnome
Eye of GNOME is an image viewer. With it you can view images of almost any type. You can manage large collections of images and can display a slideshow. You can also make basic changes to photos like rotating or flipping them, or converting them to a different file format. The images should automatically open in the Image Viewer when you double-click an image file in the file browser. If this is not the case, you should make Image Viewer the default application for viewing images. You can zoom in and out to show more or less of an image on the screen. It is useful if you want to see a large image completely or if you want to inspect the details of an image. The Image Viewer tries to guess the file format to save the image in based on the file extension you choose. If you don't recognize the file extension you type, or if you don't know which one to use, click Supported Image Files in the Save Image window. This will allow you to choose a file type from the drop down box. -
27
Free Commander
Free Commander
FreeCommander is an easy-to-use alternative to the standard Windows file manager. The program helps you with your daily work in Windows. Here you can find all the necessary functions to manage your data stock. You can take FreeCommander anywhere, just copy the installation directory on a CD or USB stick, and you can even work with this program on a foreign computer. Copy, move, delete, and rename files and folders (alternatively as Windows or FreeCommander operation) Paths longer than 255 characters can be opened, copied, moved, and renamed. File filters (regexp possible too) for display and file operations. Easy access to system folders, control panel, desktop, and start menu. File viewer and thumbnail view inside archives too. Built-in file viewer to view files in hex, binary, text, or image format. Optional tree view for each panel. Flexible configuration of almost all features. Access to mobile devices (e.g. smartphones, tablets) User-defined columns for detailed views.Starting Price: Free -
28
Konvertor
Logipole
Konvertor is a fast and reliable two-panel, multi-tab file manager for Windows. It has an intuitive interface and offers viewers for all popular file formats as well as uncommon and very rare ones (4734 in the current version). Konvertor is a way to work with files more efficiently. Konvertor does not change any settings in Windows and does not hook itself into anything inside Windows. Konvertor 5.04 works seamlessly with both 32-bit and 64-bit Windows 10, 8.1, 8, and 7. Konvertor is designed to be as fast as possible: quick navigation among directories, fast directory reading, and fast and smooth painting of panels and thumbnails. Konvertor is portable, it is configured to store all configurations and settings in the same folder that it is run from. Built-in viewers will instantly display the content of all file formats. Text and binary files, bitmap and vector images, videos, audio, and 3D files, Office documents or programs files.Starting Price: Free -
29
JetStream
Jet Digital Inc.
JetStream large file transfer software is reimagined for simplicity. JetStream transfers your large files with blazing speed, enterprise reliability, and foremost security – with the ease and simplicity your teams deserve. Our user-friendly software takes advantage of accelerated file transfer to seamlessly provide enterprise speed, reliability and security to connect people, places and technology. It’s a robust yet simplified file transfer solution that helps your teams in locations around the world collaborate faster and better, especially through digital workflow automation. With a custom accelerated file transfer protocol, JetStream provides maximum throughput and performance over high latency and unreliable connections. It’s relentless in getting your files to where they need to go. Send your large files worry-free knowing that JetStream will deliver your files intact. -
30
Xee
MacPaw
Xee is a streamlined and convenient image viewer and browser. It’s similar to macOS's preview app, but lets you easily browse the entire contents of folders and archives, move and copy image files quickly, and supports many more image formats. View contents in archives and folders, faster and easier, without extracting them. When your native preview refuses to display images because of an “unsupported file format”, use Xee for the job. You’re not only having a better view of all your files but better management also. Organize your image gallery in minutes. Xee is a Mac image viewer we always wanted and never had. It’s sleek, it’s fast, and it works with all types of images. Browse images in archives, view images of all formats and manage your galleries.Starting Price: $3.99 one-time payment -
31
Joe Sandbox
Joe Security
Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST). -
32
SolarWinds Kiwi Log Viewer
SolarWinds
Display log files in an easy-to-read tabular format and choose various search and filter options. Kiwi Log Viewer can read files up to 14TB to make sure you can view and search all logs you need regardless of size. Easily monitor changes to a specified log file in real-time. Display log files in easy-to-read tabular format. Monitor changes to a specified log file in real-time. Open files of any size and automatically highlight important text. Leverage sub-string matching or Perl-style regular expression (regex) matching. Apply highlighting rules to detect the most important messages quickly. Easily monitor log files for specific keywords, phrases, or patterns. Kiwi Log Viewer displays text-based log files in a tabular format. You can copy selected rows in tab-delimited format or click-select-copy any part of the row text. Thanks to the file tailing feature, you can monitor the specified log file for changes and view any new data added in real-time.Starting Price: $111 one-time payment -
33
SSuite Desktop Search
SSuite Office Software
SSuite Desktop Search and Find is a useful windows desktop search engine that can find files, folders, and file content. This small application is also multi-threaded for instant search results. You can rely on this tool to search for specific files or folders on your computer by typing their name (either full or partial) and specifying the target location. The application features support for quick or full path searches that you can choose between, according to your needs. Alternatively, you can choose a file type from the list, so that the application can display a list of items that match your query. Additionally, it is possible to modify various search-related parameters, such as toggling file attributes, setting file date, size and type a string of text that should match your query. -
34
Gwenview
KDE
Gwenview is a fast and easy to use image viewer created by KDE, ideal for browsing and displaying a collection of images. Allows simple image manipulations: rotate, mirror, invert, and resize. It allows basic file management actions, such as copy, move and delete, among others. It works as a stand-alone application or as a viewer integrated into the Konqueror web browser.Starting Price: Free -
35
CRAX Commander
CRAX
Dual-pane, multi-tabbed file manager for Mac OS X with approachable user interface and built-in SVN, FTP, and SSH client. With CRAX Commander file management is much faster and easier than it has been before. Dual-pane browser. Tabs and bookmarks. Definition of keyboard shortcuts. Customizable view (show/hide: panels, sidebar, menubar) Definition of external tools. Customizable toolbar. Files & folders coloring based on extension and attributes. Advanced searching for files and folders. Advanced table data filtering. Advanced archives handling. Built-in support for SVN. Built-in editor with syntax highlighting. Background file transfer using a configurable queue. Editable path navigator. Connect to FTP, SFTP, SMB, and AFP. Multi-rename files and folder merging. Calculate file checksums (MD5, SHA) Split and combine. Compare files and folders by content. Remote files view & edit.Config of ext editor/viewer.Starting Price: Free -
36
VFind Security ToolKit
CyberSoft
The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.Starting Price: $1035 one-time payment -
37
PstViewer Pro™
Encryptomatic
PstViewer Pro™ is a viewer for opening, searching and converting different kinds of email content, including .pst, .ost, .msg, .eml, and .mbox files. Use PstViewer Pro to convert emails between different formats. Save email and file attachments as PDF documents. Bulk export and convert emails Also supports bulk printing of emails. Download the free 15 day trial.Starting Price: $79.99 -
38
Seavus Project Viewer
Seavus Group
The leading Project Viewer to open Microsoft® Project MPP files. It is the leading and most complete viewer for Microsoft® Project mpp files. As a project management software solution, it is intended for all project team members and employees that need to open and view the project plans in .mpp file format. Seavus Project Viewer supports 100% of the views available in MS Project, including the professional graphical reports, and offers multiple sharing options like SharePoint integration. A professional, yet cost-effective solution, with a familiar user interface that additionally eliminates the learning curve and training costs for the project organizations and companies. Seavus Project Viewer is the most accurate viewer for .mpp files with a display of project data as seen in MS Project. It supports more than 27 views as well as unique user-defined views.Starting Price: $39.00/one-time/user -
39
Elecard StreamEye Studio
Elecard
Elecard StreamEye Studio is a set of powerful software tools for video quality analysis designed for professional use in video compression, processing, communication and streaming media industries. It consists of 5 separate stand-alone applications and command line tools for all-around video analysis: 1. Elecard StreamEye enables effective in-depth bitstream analysis to macroblock level, codec parameters inspection. Supports MPEG-1, MPEG-2, AVC/H.264, HEVC/H.265, AV1, VP9, VVC. 2. Stream Analyzer – Syntax analysis of encoded media stream. 3. Video Quality Estimator (QuEst) – comparative analysis of two encoded streams based on objective metrics and display of essential statistics of encoded streams. 4. YUV viewer – professional video analysis tool designed to view YUV data sequence, compare files and view the result of comparison. 5. Quality Gates – tool for visual comparison of several video sequences encoded with various settings: resolution, frame rate, bit depth. -
40
JETCAM CAD Viewer
JETCAM
The JETCAM CAD Viewer is a free tool to allow viewing of all major 2D CAD files on your PC. It's a lightweight tool which does not require much memory or hard disc space, and runs extremely fast. It's ideal to install on top of existing CAD/CAM software to provide you with a fast, one-click viewing of CAD files, with pan and zoom capabilities. It's provided free, 'as is' and without warranty. Extremely lightweight, JETCAM CAD Viewer can be installed on unlimited computers within your company. It provides instant viewing of all major CAD files, along with native JETCAM component files. Totally free. There's no time period or fee to unlock additional features. No registration required to download or use, just click on the Download link. No adverts, spyware or malware. Extremely small memory footprint, around 50MB when running. Simple tree view for all local and mapped network drives. Thumbnail images of all recognised 2D CAD files. -
41
jPDFEditor
Qoppa Software
jPDFEditor is intended for developers and integrators. For end-users, Qoppa Software offers PDF Studio, our advanced desktop PDF editor for Mac, Windows and Linux based on our same solid PDF technology. jPDFEditor can load documents from files on a local or network drive, from a URL and from Java input streams for documents that are generated runtime or come from other sources, such as a database. After editing documents, the library can save them. Features: -Display PDF files -Print PDF files -Convert text and image files (gif, png, jpg, tiff) to PDF on the fly -Fill and save interactive PDF forms -Markup PDFs (all PDF annotations and text markups supported) -Digitally sign PDF files -Content editing -Redaction -Optional OCR module -Optional Comparison module -Access jPDFProcess powerful PDF manipulation API -Text search, selection, copy -Easy navigation with thumbnail, bookmark, annotation, signature views -Advanced tools: zoom, loupe, snapshot, pan and zoom -
42
xlCompare
Spreadsheet Tools
xlCompare is a spreadsheet compare utility that finds and highlights differences in Excel files, CSV and XML files. xlCompare is a fast and efficient tool for comparing and merging Excel workbooks. It gives you a perfect color-coded report for the differences found. Command line mode makes this tool suitable for integration into other applications, that require external diff viewer for Excel files. Primary functions of the xlCompare: - Find differences in Excel files (XLS, XLSM, XLSX) - Find differences in CSV and XML files - Compare Visual Basic code in Excel files - Compare VBA Forms and controls in Excel files - Merge several Excel files - Compare Excel files from command line - Compare 3 Excel files (3-way comparison) - Extract matching and unique rows in Excel worksheets - Compare specific segments of worksheet data - Create presentation report for compared files - Explore Formula Logic xlCompare saves your working time and increases productivity!Starting Price: $49 -
43
DDS-CAD Viewer
Data Design System
Thanks to its advanced interpretation of IFC data, the DDS-CAD Viewer is indispensable for the BIM scene. It is a free tool used for viewing, analyzing, merging, and discussing BIM models worldwide. In addition to IFC, the DDS-CAD Viewer supports data formats common to the AEC industry such as DWG, gbXML and 3ds. View, check, edit or create IFC, BCF, gbXML and DWG files. Intuitive 3D navigation options. Multidisciplinary clash detection. Visualization filters for analyzing model information. Integrated BCF manager. Advanced interpretation of IFC data. The DDS-CAD Viewer allows you to open and analyze different file formats such as DWG files and the OPEN BIM file format IFC. Various navigation options are available. The latest DDS-CAD Viewer provides an interdisciplinary clash detection, allowing you to automatically analyze models on design issues. The integrated BCF manager enables you to seamlessly communicate these issues. -
44
Altap Salamander
Altap
Altap Salamander 4.0 works seamlessly with both 32-bit and 64-bit Windows 10, 8.1, and 7. Most popular network protocols such as FTP, FTPS, SCP, or SFTP are supported. Altap Salamander is designed to be as fast as possible: quick navigation among directories, fast directory reading, and fast and smooth painting of panels. Full control over your recent history lists, seamlessly integrated password manager, or option to protect your sensitive files with strong encryption algorithms. Built-in viewers will instantly display the content of the most popular file formats. Text and binary files, bitmap images, or database files. Open architecture allows to extend Altap Salamander with custom plugins or automate common tasks using scripts written in any language supported by the Windows Script Host such as JScript or VBScript. Work with your files even if they are stored in archives. All major formats as ZIP, RAR, 7-Zip, or ISO/UDF image are supported.Starting Price: Free -
45
Duplicate & Same Files Searcher
Download Crew
Duplicate & Same Files Searcher is an advanced tool for locating and dealing with duplicate files. The program locates files with identical content only; unlike some similar tools, you can't compare files just on their names, dates or size. This makes Duplicate & Same Files Searcher relatively slow, as it must read and process every single file in your selected group. Fortunately, there are some ways to improve performance. You can direct the program to scan a particular folder tree only, to examine files of a particular type, to ignore others, to check only files of a defined size. There are some options you won't often see elsewhere. You can have the program check for (or ignore) differences in alternate data streams, to ignore different ID3 tags in MP3s, to skip symbolic links (or not). When the scan is complete, each set of duplicates is listed, along with their file names, paths, size, dates, even their number of fragments (whether they're fragmented or not). -
46
Foxit APIs are a suite of scalable, cloud-based developer tools designed to integrate high-performance PDF processing, document generation, and eSignature capabilities directly into applications and workflows. Built with an API-first approach, they provide modular endpoints that allow developers to generate, edit, display, convert, and manage documents programmatically, enabling full control over document lifecycles from creation to signature and archival. It supports automation at scale by allowing users to generate PDFs and DOCX files from structured data, eliminating manual document creation and ensuring consistent formatting across workflows. It also enables advanced document analysis by extracting content and metadata for compliance, indexing, and business intelligence use cases. Through REST APIs, developers can convert files between formats, merge, split, and manipulate documents, as well as embed PDF viewers directly into web applications with customizable controls.Starting Price: $112.39 per year
-
47
ArchCommander
MPL Software Studio
ArchCommander is a tool that helps you manage your archive files. It allows you to perform many operations without unpacking the entire archive file. And of course, you can unpack selected files or everything, and create brand new archives as well as add or remove files from existing archives (if they support modification). Unpacking and creating archives is also possible directly from the Finder, just select the files and use the context menu to select the operation. If you have an archive file created on an operating system that does not use Unicode you can open it in ArchCommander and select the right characters encoding for file names (available for arj, lha/lzh, zip, rar and tar archives). ArchCommander delivers its Quick Look plugin that allows you to display archive file content directly from the Finder, just hit a space bar. Performance improvement for operations with thousands of small files.Starting Price: $2.99 one-time payment -
48
Unreal Commander
Max Diesel
Unreal Commander is a freeware file manager for Windows® Vista/7/8/10/11. Two-panel interface. UNICODE support, an extended search of files. Multi-rename tool and synchronization of directories. Support of archives ZIP, 7Z, RAR, CAB, WIM, TAR, GZ, TGZ, BZ2, TBZ2, LHA, and ARJ. Built-in FTP client, thumbnail mode, and folder tabs. Support of WLX/WCX/WDX plugins. Build-in viewer and quick view function. Network support and drag-and-drop support. History and Hotlist functions. Copy/move/delete files background mode support. Deleting files with WIPE. Background pictures support. Visual styles: color categories of files, fonts for all interface elements, and more. With Unreal Commander"s many features you can manage your files and folders with greater ease. Its familiar design makes it accessible to advanced and novice users alike. Automatic numbering mode has been added to the file renaming dialog displayed when copying.Starting Price: Free -
49
WFilter Enterprise
IMFirewall Software
WFilter is an Internet filtering software that can help organizations to monitor and manage all Internet behaviors on their networks.You only need to install WFilter in one computer to monitor your whole network. Monitor and archive all Internet activities including web surfing, Email contents, chatting contents, transferred files and so on. Filter certain websites, emails, messengers and file transfers. Block P2P software, online stream, Internet games, stock software and others. Real time monitor of online messengers, web surfing, file transfers and all Internet links. Various kinds of graphics statistics of chatting, web surfing, email... -
50
Shotwell
Shotwell
Shotwell supports JPEG, PNG, TIFF, BMP, GIF, WebP and RAW photo files. Shotwell's RAW format support is currently limited. When you view a RAW photo, you are actually viewing a JPEG derived from the RAW photo, not the RAW image itself. Additionally, the RAW editing pipeline is not fully 16-bit - you can only export edited photos as 8-bit files. Most supported formats can be used for export (JPEG, PNG, TIFF, BMP). The Basic Information pane appears at the bottom of the sidebar, and displays a brief summary of the photos you've selected. If no photos are selected, it displays a summary of the entire collection. You can toggle the display of this pane using the information command. The map pane appears at the bottom of the sidebar as part of the basic Information pane, and displays an overview map the photos you've selected. If no photos are selected, it displays an overview of the entire collection.