Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
FileTools
4
Ross Flint
FileTools is a flexible and powerful suite of tools for easily performing a wide variety of file wrangling and processing...
supports a choice of verification
methods
, including checksums. The duplicate
Election Manager 2016
4
Lensflare Games LLC
Have you ever wondered what if? What if 2016 had gone differently...
States • Use ads to
attack
your opponent
SysInfotools Mac EML Converter
4
SysInfoTools Software
MAC EML Converter of Sysinfotools is used to migrate MAC EML file to other file formats like PDF, MSG...
are looking for some
methods
to convert MAC
NoseDive Prowl
free
4
Antell Software
NoseDive Prowl is a simple FreeWare game for MacOSX. The human colony on Tau Ceti is under attack...
Tau Ceti is under
attack
by hostile alien forces
MetaClean
72
Adarsus.com
Most files contain metadata as a way to make finding and working with them easier...
can use three different
methods
, which include dragging
Cloak
free
251
Tao Effect LLC
Cloak is an application that provides you with a solution when it's imperative...
brings you two hiding
methods
: prefix
SlipBox
free
77
Markus Guhe
SlipBox is a useful Mac application that can help you quickly...
files with various encoding
methods
. In addition, SlipBox
Laughing Man
free
4
allusions
Laughing Man is an application for monitoring webpage changes...
Man explores data storage
methods
and a framework...multiple storage
methods
in an application
Recoverit Free for Mac
free
4
Wondershare Software Co., Ltd
1.Free data recovery for all major filetypes, including photos...
external device corruption, virus
attack
, sysytem crash, bootable problems
Magic Hider
122
Pavel Kosykh
Magic Hider can help you hide sensitive parts of an image...
Magic Hider can help you hide sensitive parts of an image, mainly those that may affect someone’s
Newton-II
4
University Wuerzburg - Germany
Newton-II is a program for solving mechanical equations of motions numerically...
the DEQs several solution
methods
up...sturdy adaptive Runge-Kutta-
Method
of 4th order can
Yoga for Migraines
69
com.saagara
Description “Yoga for Migraine” provides a structured series of yoga poses which aim to relieve migraines...
in ancient yogic
methods
. The program guides...emphasizing correct breathing
methods
. As you become
PDFOptim
44
RootRise Technologies Pvt. Ltd.
PDFOptim helps you reduce the size of heavy scanned PDF documents. In this respect...
of the two compression
methods
available: Quartz...different options and
methods
, you can
Raindrop
27
Mussabekov Rustem
Raindrop helps you bookmark different kinds of resources so that you can find them again...
allows using two different
methods
to organize your bookmarks
BurpSuite
free
10
PortSwigger Ltd.
Burp Suite is an integrated platform for performing security testing of web applications...
analysis of an application's
attack
surface, through to finding
JSON Class Generator
free
16
Lifted Software UG
JSON Class Generator is an application that generates Objective...
The source code has
methods
for converting/parsing
ESET Cyber Security Pro
434
ESET
ESET Cyber Security Pro represents a new approach to truly integrated computer...
your computer against
attacks
and malicious...other Internet-borne
attacks
without hindering
Spaceketball
4
Michael Sandt
Spaceketball is a kind of basketball game but a little different. You are playing...
on reaction and 'ENEMY
ATTACK
' which is a third person
PureFTPd Manager
free
202
Jean-Matthieu Schaffhauser
PureFTPd Manager is a simple Cocoa frontend to PureFTPd, "a free (BSD)...
access, configure your authentification
methods
, regulate bandwith usage
Cloud Printer
free
895
Somasundaram Meiyappan
This application allows you to send a print job to your Google Cloud Print enabled printer...
a print option, this
method
should work...In all other
methods
of using the application
1
…
6
7
8
9
10
…
20
Tags
Bookmark Songs
Bookmark Webpages
Code Values
Hide Documents
Image Hider
Invisible Attribute
Manage Hidden File
Save Pages
Security
Tagged Resources
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.