Doublekiller icon
Doublekiller icon

Doublekiller

 19 likes

DoubleKiller searches single or multiple directories for duplicate files by comparing any combination of file name, size, modification date and content. Using user-defined masks like *.mp3 or *.dll you can limit the scan to files that interest you or protect important files from...

Searching

License model

  • Free PersonalProprietary

Application type

Platforms

  • Windows
Discontinued

The website is dead.

  No rating
19likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Duplicate File Finder

 Tags

  • duplicate-files

Doublekiller News & Activities

Highlights All activities

Recent activities

No activities found.

Doublekiller information

  • Developed by

    Unknown
  • Licensing

    Proprietary and Free Personal product.
  • Alternatives

    49 alternatives listed
  • Supported Languages

    • English

AlternativeTo Categories

OS & UtilitiesFile Management

Our users have written 0 comments and reviews about Doublekiller, and it has gotten 19 likes

Doublekiller was added to AlternativeTo by manwithcake on Feb 14, 2010 and this page was last updated Oct 6, 2021.
No comments or reviews, maybe you want to be first?
Post comment/review

What is Doublekiller?

DoubleKiller searches single or multiple directories for duplicate files by comparing any combination of file name, size, modification date and content. Using user-defined masks like *.mp3 or *.dll you can limit the scan to files that interest you or protect important files from being scanned. Furthermore you can exclude files in a particular file size range or files with certain attributes, like hidden or system files. When the scan is finished a list containing all duplicates found is displayed and you can manually or automatically select the files to be removed. The result list can be sorted and exported to a text file readable by both humans and spreadsheet applications. DoubleKiller is a stand-alone executable that does not need to be installed, just extracted and run, and does not alter the system in any way without the users prior permission.