Software: Attacker

 
Security Update for Windows 2000 (KB904706) 1.0Microsoft

Security Update for Windows 2000 (KB904706) is designed for the unwanted situation when an attacker attempts to remotely compromise your Windows-based system using DirectShow and gain control over it. This tool is created for Windows 2000 Service Pack 4.

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 770.8 KBReleased: 26 March, 2012
Download: http://download.microsoft.com/download/f/d/a/fda566b9-818b-4901-adc6-f0b406b25f77/Windows2000-KB904706-v2-x86-ENU.exe
Security Update for Windows XP (KB923980) 1.0Microsoft

Security Update for Windows XP (KB923980) allows you to identify a possible attacker that could compromise your Windows-based system and gain control over it. The application is developed for Windows XP Service Pack 2 and it provides a simple user interface.

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 664.8 KBReleased: 05 June, 2012
Download: http://download.microsoft.com/download/b/f/3/bf33facd-f628-4c19-bd69-86341da0db23/WindowsXP-KB923980-x86-ENU.exe
BN+ Brute Force Hash Attacker 1.2De Dauw Jeroen



BN+ Brute Force Hash Attacker is a tool for the recovery of passwords stored in hash formats, using brute force methods.

Platform: WindowsSystem Utilities- Backup & Restore
License: FreewareSize: 515.7 KBReleased: 25 February, 2012
Download: http://sourceforge.net/projects/bfha/files/BN+%20Brute%20Force%20Hash%20Attacker%201.2.0.zip/download?use_mirror=superb-dca2
Foundstone Socket Security Auditor 1.0McAfee Inc.

Insecurely bound server sockets allow an attacker to bind his, her own socket on the same port, gaining control of the client connections and ultimately allowing the attacker to successfully steal sensitive application user information as well as launch denial of service attacks against the application server.

McAfee Foundstone Socket ...

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 653.7 KBReleased: 15 June, 2012
Download: http://downloadcenter.mcafee.com/products/tools/foundstone/socketsecurityauditor.zip
Security Update for Windows XP (KB972270) 1.0Microsoft

A security issue has been identified that could allow an unauthenticated remote attacker to compromise your system and gain control over it. You can help protect your system by installing this update from Microsoft. After you install this update, you may have to restart your system. Some malicious software acts as a service, waiting for connections ...

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 555.4 KBReleased: 15 April, 2012
Download: http://download.microsoft.com/download/E/1/3/E13622B6-84F8-40D3-9D7A-958512BD4D52/WindowsXP-KB972270-x86-ENU.exe
Security Update for Windows Server 2003 (KB958687) 1.0Microsoft

Security Update for Windows Server 2003 (KB958687) can protect your computer in case an unauthenticated remote attacker is about to compromise your system and gain control over it. This this update from Microsoft can solve the problem. After you install this update, you may have to restart your system.

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 719.4 KBReleased: 29 May, 2012
Download: http://download.microsoft.com/download/6/9/8/698F11AA-15C7-4BAF-818D-2BCC1704F202/WindowsServer2003-KB958687-x86-ENU.exe
Security Update for Windows XP (KB952954) 1.0Microsoft

A security issue has been identified that could allow an unauthenticated remote attacker to compromise your Microsoft Windows-based system and gain control over it. You can help protect your computer by installing this update from Microsoft. After you install this item, you may have to restart your computer.

Platform: WindowsSystem Utilities- Other
License: FreewareSize: 520.0 KBReleased: 14 February, 2012
Download: http://download.microsoft.com/download/a/1/9/a19c9aff-bd94-4fc1-98ff-db432358f902/WindowsXP-KB952954-x86-ENU.exe
SSLGuard 1.0.3decrew.indivia.net

The man-in-the-middle attack (MITM) is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them.
The add-on provides a built-in list of web sites. You will also have the possibility of adding your own list of web sites.Requirements:
* Firefox

Platform: WindowsNetwork & Internet- Browsers
License: FreewareSize: 23.2 KBReleased: 02 May, 2013
Download: http://decrew.indivia.net
Crew - Hacking - Programming - Decrew
Durak 2.3.8FreeSweetGames

If the attack fails, the defender becomes the next attacker. Aces are high. Trumps are higher than non-trump cards (e.g., a trump 6 always beats a nontrump ace). Non-trump attacking cards may be beaten by either a) a higher card of the same suit or b) a trump. Trump attacking cards may only be beaten by higher trumps.

Durak 2.3.8 by FreeSweetGames
Platform: Win98,  WinME,  WinNT 4.x,  WinXPAudio & Multimedia- Other
License: FreewareSize: 43.2 MBReleased: 12 January, 2009
Download: http://freesweetgames.com/files/fsgDurakSetup.exe
PDF Password Recovery Analyzer for Mac 1.0PDF Password Recovery Online

You open a PDF file from disk and the program shows comprehensive information about this file including the cryptographic algorithm used and estimated time an attacker will need to crack your PDF password. The time is calculated for your local PC and for a powerful computing cluster.

In case you have lost your password, it may take ages ...

PDF Password Recovery Analyzer for Mac 1.0 by PDF Password Recovery Online
Platform: Mac OS X 10.6Security & Privacy- Password Managers
License: FreewareSize: 1.2 MBReleased: 27 March, 2012
Download: http://pdfpasswordrecovery.org/pdfanalyzer/PDF_Analyzer.app.zip
Pdf Password Recovery - Pdf Password Recovery Online - Recover Pdf Password - Password Recovery
Bee Empire 1.0.0Novel Games Limited

Your majestic empire has long enjoyed its peace and prosperity, with rich resources and well-constructed colonies spreading all over the realm. But your ambitious neighbor, the kingdom of hornets, is casting the greedy eyes on your homeland. Hordes of fierce soldiers are sent to invade your empire with only one goal: to seize and colonize the land.

Bee Empire 1.0.0 by Novel Games Limited
Platform: Windows,  WinXPGames & Entertainment- Strategy & War Games
License: FreewareSize: 257.0 KBReleased: 07 June, 2012
Download: http://www.novelgames.com/flashgames/beeempire/beeempire.exe
Attack - Attacker - Battle - Bee
PvLog LicenseManagerKiller 64 Itanium 1.0PV Logiciels

This tool is rudimentary and releases only most naive protections, but you can imagine that PvLog DeObfuscator and Reflector would allow a determined attacker to remove more sophisticated license controls.

PvLog LicenseManagerKiller 64 Itanium 1.0 by PV Logiciels
Platform: WindowsDevelopment- C / C++ / C#
License: FreewareSize: 589.0 KBReleased: 10 June, 2012
Download: http://dotnetprotector.pvlog.com/downloads/LicenseManagerKillerItanium.zip
PvLog LicenseManagerKiller 64-bit x64 1.0PV Logiciels

This tool is rudimentary and releases only most naive protections, but you can imagine that PvLog DeObfuscator and Reflector would allow a determined attacker to remove more sophisticated license controls.

PvLog LicenseManagerKiller 64-bit x64 1.0 by PV Logiciels
Platform: WindowsDevelopment- C / C++ / C#
License: FreewareSize: 382.0 KBReleased: 26 April, 2012
Download: http://dotnetprotector.pvlog.com/downloads/LicenseManagerKillerX64.zip
PvLog LicenseManagerKiller Win32 1.0PV Logiciels

This tool is rudimentary and releases only most naive protections, but you can imagine that PvLog DeObfuscator and Reflector would allow a determined attacker to remove more sophisticated license controls.

PvLog LicenseManagerKiller Win32 1.0 by PV Logiciels
Platform: WindowsDevelopment- C / C++ / C#
License: FreewareSize: 414.0 KBReleased: 14 February, 2012
Download: http://dotnetprotector.pvlog.com/downloads/LicenseManagerKillerWin32.zip
FreeSweetGames Durak 3. 1. 1940FreeSweetGames

The player with the lowest trump is the first attacker or the player to the left of the previous fool. Transferrable durak option allows the defender may choose to pass the attack on clockwise around the table. In this case, the defender may only pass on the attack if he has in his hand a card of the same rank as the attacking card. To pass on the ...

FreeSweetGames Durak 3. 1. 1940 by FreeSweetGames
Platform: WindowsGames & Entertainment- Card
License: FreewareSize: 1.2 MBReleased: 24 April, 2012
Download: http://freesweetgames.ru/files/games/fsgDurak.exe
SpoofStick for Firefox 1 6corestreet.com

The attacker

Platform: WindowsNetwork & Internet- Browsers
License: FreewareSize: 15.0 KBReleased: 13 June, 2012
Download: http://www.spoofstick.com/downloads/spoofstick-firefox.xpi
Update for Microsoft Office Excel 2007 12.0Microsoft

An attacker who successfully exploited these vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate ...

Platform: WindowsBusiness- Office Suites & Tools
License: FreewareSize: 0Released: 20 June, 2012
Download: http://update.microsoft.com/microsoftupdate/v6/default.aspx
SPL Free Ranger 1.3SPL

An EQ processing straightly reveals the sound quality of a software – probably better than any other processing tool. Therefore, the Free Ranger ideally demonstrates the amazing qualities of the Analog Code plug-ins.
The Free Ranger is based upon the Full Ranger-EQ from the EQ Rangers series. It is limited to four bands:
-16 kHz ...

Platform: WindowsAudio & Multimedia- CD Players
License: FreewareSize: 3.2 KBReleased: 11 May, 2012
Download: http://spl.info/en/software/free-ranger/description.html
CyberCIEGE 1.9United States Government



Attacker motives to compromise assets differ by asset and scenario, thereby supporting scenarios ranging from e-mail attachment awareness to cyber warfare.

Platform: WindowsGames & Entertainment- Other
License: FreewareSize: 116.3 MBReleased: 12 January, 2012
Download: http://www.cisr.us/cyberciege/downloads/setup-demo.exe
easypingerplus.exe 1.0Countertop Options

Flood pinging may be abused as a simple form of denial-of-service attack, in which the attacker overwhelms the victim with ICMP echo request packets.

easypingerplus.exe 1.0 by Countertop Options
Platform: Windows,  Win98,  WinXPNetwork & Internet- Network Monitoring
License: FreewareSize: 24.0 KBReleased: 29 April, 2013
Download: http://www.countertopoptions.org/easypingerplus.exe
netcheckz 2.2Black Granite

Flood pinging may be abused as a simple form of denial-of-service attack, in which the attacker overwhelms the victim with ICMP echo request packets.The ping utility was authored by Mike Muuss in December 1983 as a tool to troubleshoot problems in an IP network. He named it after the sound that sonar makes, since its methodology is similar to sonar's ...

netcheckz 2.2 by Black Granite
Platform: Windows,  Win98,  WinXPSystem Utilities- Other
License: FreewareSize: 24.0 KBReleased: 22 May, 2013
Download: http://www.blackgranite.org/netcheckz.exe
Gopher Smoker .06PivX Solutions, LLC

Once root is achieved, the attacker can steal anything they want from you including your personal databases, contacts, records, documents and more... PivX cleans up someone else's mess with another small, free, streamlined security tool to make your computer safe once again.

Platform: WindowsSecurity & Privacy- Other
License: FreewareSize: 256.0 KBReleased: 28 December, 2012
Download: http://www.pivx.com/
Panda Safe Browser 1.0www.pandasoftware.com

So, an attacker should have to be aware of this and to bypass at least four much elaborated levels of security even before arriving to your greal h PC, where with the help of the most advanced Panda Security technologies (that, alone, have several more layers of protection) you would be totally shielded from that very slight possibility of attack. ...

Platform: WindowsNetwork & Internet- Browsers
License: FreewareSize: 3.0 MBReleased: 01 January, 2013
Download: http://www.pandasecurity.com/
DShield Universal Firewall Parser 1.0.30www.dshield.org

org Web site, you will be able to see how severe the attacks are, how many other users were attacked by the same sources and where the attacker came from.

Platform: WindowsWeb Development- Web Log Analysers
License: FreewareSize: 1.9 MBReleased: 24 May, 2013
Download: http://www.dshield.org
Isc - Sans - Internet - Security
Enhanced Mitigation Experience Toolkit 3.0www.microsoft.com

Security mitigation technologies are designed to make it more difficult for an attacker to exploit vulnerabilities in a given piece of software. EMET allows users to manage these technologies on their system and provides several unique benefits:
1. No source code needed: Until now, several of the available mitigations (such as Data Execution Prevention) ...

Platform: WindowsServers- Other Server Applications
License: FreewareSize: 6.0 MBReleased: 09 March, 2013
Download: http://www.microsoft.com//en-us/default.aspx
Microsoft - Product - Support - Help


Free Download 64 Notice: Free Download 64 is not responsible for Attacker software you are downloading nor for details provided about the software listed here about Attacker, as developers can modify program information without notifying us. Even if we try to check the files for viruses, we cannot guarantee that they are safe and clean. For your own protection always virus scan downloaded files for viruses, spyware and malware. We at FreeDownload64.com does not provide any torrent files, links to any file sharing sites including Rapidshare, YouSendIt, SendSpace, DepositFiles, etc. Software piracy is theft. All download links of listed software are direct full download from publishers sites or selected mirrors. Using crack, warez version, warez passwords, patches, serial numbers, registration codes, keymaker, key generator, keygen or pirate license key is illegal and prevent future software developments.