Software Downloads | Home | Submit | Latest News | Category | Contact us |
Search for Hack HttpTrafficGen 1.5 in Nsasoft LLC. This is a HTTP traffic generator for testing web applications. You can specify the requests count and interval between two requests. The generated requests are sent to the specified URL. It is a very simple and fast program which can simulate client activity.East-Tec CryptSecure 2006 1.1 in EAST Technologies East-Tec CryptSecure 2006 keeps your data safe from hackers or from nosy people. You can create secured drives where you can safely keep sensitive personal files, passwords or financial data. When you have finished working with your secured drive, you can hide it with a single mouse click. You can also create and e-mail secured individual files. The recipient does not even need to have a copy of CryptSecure installed to access the files.BS Hacker Replay - Unlimited 1.144 in Stardock Systems BS Hacker is a unique hacking simulation game. You enter the underground world and play the role of a hacker, working against a system that aims to control everything. A complete hacker console and interface will create a perfect hacker environment, while the realism of the game elements will make you wonder if this is real ... or just a game. BS Hacker Replay - Unlimited contains 23 levels divided into five episodes.Max Secure AnonySurf 5.0 in Max Secure Software Top Reasons to choose Max Secure AnonySurf: 1. 92% of companies monitor their employee Internet activities. 2. Firewall protect your PC but not your identity while surfing the net. 3. Keep your private online hobbies private. 4. Protects against pharming 5. Allows you to surf the Web with privacy Includes a database with hundreds of anonymous public proxy servers located all over the worldFinger 1.9 in Nsasoft LLC. Finger is the tool for discovering user information by using well known finger service.Using Finger tool makes possible to get Abuse Address of remote host.For example to get the abuse address of prontomail.com you should type [email protected] in the finger input section.ArpCacheWatch 1.3 in Nsasoft LLC. ArpCacheWatch monitors Windows ARP cache and allows to send an ARP request to obtain the physical address that corresponds to the specified destination IP address. The ARP cache contains IP/MAC translations so that every time an IP packet are to be sent, the MAC address doesn't have to queried through a broadcast, instead it can use the cached address.ShareAlarm 2.2 in Nsasoft LLC. Share alarm is a tool that allows you to see parameters of the workstation which tries to establish a connection with your computer.The remote workstation, user, path, OS, permissions of the accessed folder, connection time will available via this tool .The tool is designed with a user-friendly interface and is easy to use.The program have firewall system that allows to block any unwanted connection to your shared resources.NetSendFaker 1.2 in Nsasoft LLC. NetSendFaker allows you to send anonymous net send messages to anyone that is connected to the network. You can also emulate messages as if they were sent from other computer. The tool is designed with a user-friendly interface and is easy to use.Entry LE 2.72 in Sparkleware Test the security and robustness of your servers, via remote brute-force attack. - Compatible with HTTP, FTP, and POP3 servers - Internal word generator with character set selection - Supports all major wordlist formats - Coordinates attacks across multiple machines - Supports HTTP proxy servers - Track attack history in easy-to-read logs - Automatic save and filtering functionsBestCrypt 7.20.2 in Jetico, Inc. BestCrypt is easy-to-use, powerful data encryption software. You allocate a portion (container) of free space of your drive where you keep all your sensitive data in encrypted form. BestCrypt creates a virtual drive in your system which you work with like with any other drive. All data written there are encrypted "on-the-fly". Strong encryption algorithms Rijndael (AES), Blowfish,Twofish, GOST, DES. Time-out and Hot Key options.Hacker 2012 - Final Transfer 1.01 in Terminal Zero Delve deep into the underground world of a computer hacker Working for a black agency, your mission is to steal money, files, and other valuable material from internet servers across the world. An organization known as Mindlink, is built on the concept of its network hacking software, Mindlink Control. This software is used by agents to crack into thousands of network computers every day. Millions of dollars are reported missing as a result.Jetico Personal Firewall 1.0.1.61 in Jetico, Inc. Jetico Personal Firewall protects your computer from unwanted hacker's attacks from outside as well as from malicious programs "living" secretly inside your computer's memory and hard drive. Three levels of protection are included: low-level network packets filtering, application-level network events filtering and filtering of user-level process activity. Jetico Personal Firewall checks every packet that comes in or out of your computer.BCWipe 3.07.2 in Jetico, Inc. BCWipe ensures that another person will not restore files you have deleted from a disk. BCWipe uses military-grade procedures to shred deleted file contents. BCWipe wipes individual files and folders, wipes free disk space, wipes the swap file to remove any possible remaining sensitive data, and wipes directory entries. BCWipe includes Task Manager to set up predefined times when files are wiped out automatically.Windows Service Finder 1.0 in Enfis The Paladin Windows Service Finder is an handy tool for system administrators and hackers, it shows the complete list of installed services and boot registry keys on operating system. You can also delete any services and/or boot registry keys, if you want, with the "Kill" options.In order to complete all these "Kill" operations you must login to system with the administrator rights!FlashFXP Password Decryption 1.0 in den fete gjengen This little puppy will decrypt all passwords in FlashFXP's Sites.dat and make them readable in good ol' cleartext! All you have to do is double click the text box and a dialog will appear. Locate your Sites.dat and hit the "Decrypt" button. Voila! All sites will be listed!
|