Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
OpenVPN (OS X)
free
4
OpenVPN
OpenVPN is a full-featured SSL VPN solution which can accomodate a wide range of configurations...
supports flexible client authentication
methods
based on certificates
Radiator
4
Open System Consultants
Radiator RADIUS server is flexible, extensible, and authenticates from a huge...
a huge range of auth
methods
, including Wireless, TLS
PapiDefense
free
34
Yohei Iwasaki
PapiDefense is a very nice arcade game for the Mac. In this game, you have to defend Mr. Papi from a rocket attack...
Mr. Papi from a rocket
attack
by shooting
Ultimate Hangman
77
EnsenaSoft
Ultimate Hangman is a fully-featured Hangman game with a bunch of built...
four themes offer alternative
methods
of counting down guesses
ArpGuard
20
Calin Popescu
securityfocus.eu@gmail★★ ★★★ Suggestions & Bug Report at: securityfocus.eu@gmail ★★★ ArpGuard protects...
a Man in The Middle
attack
, which can compromise...Mac.This type of
attack
is increasingly
NTFS-3G
free
4
Tuxera
The NTFS-3G driver is a freely and commercially available and supported read/write NTFS driver for Linux...
Please see our test
methods
Dethroned!
free
17
Treehouse Ltd.
Dethroned! is an action RTS game where you command a hero, gather a scruffy band of soldiers...
soldiers, construct defences and
attack
your opponent
Forgiva
free
4
Sceptive
Forgiva is a brand new password managing idea. It's developed by security professionals to maintain and protect...
force and/or dictionary
attack
. You can choose complexity
Gladiator
17
Tone2 Audiosoftware
It gives you a groundbreaking approach to sound generation.
exhaustive list of synthesis
methods
. All synthesis types can
Obba
4
Spacelike
Obba provides a bridge between spreadsheets and Java classes...
object label. Asynchronous
method
invocation...for constructors or
methods
Yoga for Weightloss
64
com.saagara
This app was designed to help you tone your abs, get in shape, and improve your overall health...
in ancient yogic
methods
. The program guides...emphasizing correct breathing
methods
. As you become
Biofilm Attack
4
Battery Acid Games
Biofilm Attack…Play with the various types of Bacteria in this Real-Time Strategy game...
Biofilm
Attack
…Play
No Gravity
15
realtech VR
No Gravity... In a distant future, spread across thousands of colonies...
the empire is under
attack
from a mysterious, unknown sickness
DupHunter
47
TeoreX
DupHunter is a duplicate finder created for Mac that helps you easily and quickly...
choose between two import
methods
...tested both scanning
methods
VPN Tracker 365
31
equinux
VPN Tracker is the market leading VPN client for Mac OS X...
standard and vendor-specific
methods
for automatic VPN configuration
Free PDF Password Recovery for Mac
free
ThunderSoft
Free PDF Password Recovery is the solution to recover forgotten PDF password...
and three decryption
methods
...
Attack
and Dictionary three powerful decryption
methods
Brick Attack
Dan Zink
Brick Attack is a remake of one of the very classic standbys of the gaming world...
Brick
Attack
is a remake
Newsgroup Image Collector 2013
4
DataFire Technologies
NIC is the perfect tool for collecting images from Usenet newsgroups. NIC can search one or more newsgroups...
using a variety of different
methods
. You can filter message
Blue Crab Lite
15
By Limit Point Software
Blue Crab Lite is a an app that you use to copy a Web site to your computer...
Completeness. Unique URL finding
methods
yield very complete
Hero Academy
1,297
Robot Entertainment, Inc
Hero Academy is an entertaining board game that puts your strategy skills to the test through numerous challenges...
on the board and
attack
the enemy's troops
1
…
7
8
9
10
11
…
20
Tags
Casual
Dictionary Attack
Duplicates Finder
Fight in Battles
Find Duplicates
Identical Images
Managing Idea
Photo Duplicate
Security Professionals
Side Characters
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.