Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
hidden attacks
Featured
Hidden Attacks
Software
Relevance
Popularity
Rating
Middle-earth: Shadow of Mordor GOTY
4
Feral Interactive Ltd
Sauron has returned, and no mortal can stand in his path.
Uruks with deadly ranged
attacks
. • Dismantle Sauron’s...to learn devastating
attacks
Happy Gunner
1
usamau04 melambe
HappyGunner is a mix between a strategy game and an action game. You control soldier Rodriguez, who has to stop enemy troops...
defend himself from their
attacks
, as well
No Time To Explain Mac v1
1
Tiny Build Games
The first project is called No Time To Explain which is a comedy platformer game about beam...
time travel, giant crab
attacks
, evil clones
Mystery Agency - A Vampire's Kiss
1
dtp entertainment AG
Mystery Agency - A Vampire's Kiss is about Sarah...
Sarah’s eyes, a dark shadow
attacks
Emily and drags
Chopper Down
1
Porcellus, Inc.
In this game you'll have to defend a Blackhawk helicopter. You can use special attacks and defensive support including...
You can use special
attacks
and defensive support including
Defense Technica
1
Kuno Interactive
Defense Technica is the next evolution in hardcore tower defense strategy games. You can protect the core from an onslaught...
features and methods of
attacks
Letter Quest: Grimm's Journey
1
Bacon Bandit Games
Letter Quest is a turn-based RPG where players attack monsters by spelling...
RPG where players
attack
monsters by spelling...heal themselves, use critical
attacks
and much, much
Moonrise
1
Undead Labs
Moonrise combines the deep strategy of a collectible card game with the tactical pacing...
transformed into savage Lunari,
attacking
towns and cities
Dragon Fantasy: The Black Tome of Ice
1
Muteki
Dragon Fantasy: The Black Tome of Ice Travel is a 2D fantasy adventure game. Travel through the frozen...
aware Area-of-Effect
attacks
and power moves
ARPShield
1
Anobot LLC
ARPShield protects your Mac by monitoring your network for any suspicious...
Middle (MITM)
attack
, where the
attacker
...out these MITM
attacks
. ARP Spoofing happens
Respite 3D Epic Fantasy Shooter
1
TamGames
Respite 3D Epic Fantasy Shooter is an epic action-packed and story-driven shooter for your entertainment...
Dark Lord launched his
attack
CryptoTec Zone
free
1
CryptoTec AG
CryptoTec Zone offers 100% protection against any unauthorized...
withstand even the severest
attacks
of highly-equipped organizations
Beach Life
Eidos
It's time to slather on the suntan lotion, slip on your flip-flops, and head down to the beach for an epic spring break...
scuffles to savage shark
attacks
, you're in charge
Bounceback Professional
CMS Products
BounceBack Professional is designed for hard drive based backup and recovery...
vulnerable to failure, virus
attacks
Pax Solaris
Niels Bauer Games
Pax Solaris is a fast-paced and addictive real-time strategy game...
and carry out rapid
attacks
and tactical retreats. Multiplayer
Nanotech
Stormcloud Creations
From the developer: "An innovative cyber-gangster strategy game where you become the leader of an underground...
corrupt judges, fight off
attacks
on your headquarters
Mall Tycoon 2
Global Star Software
Build, design, and manage your very own shopping mall in the sequel...
floods, fires, and criminal
attacks
. Increase profits by serving
Heroes of War
free
Heroes Games
You arrive at the Kingdom of Kot with your brave peasants and loyal dogs...
if you survive the
attacks
without taking
Nessus (OS X)
free
The Nessus Project
The Nessus Project provides a free, powerful, up-to-date, and easy-to-use remote security scanner...
other types of malicious
attacks
. Unlike other security scanners
1
…
14
15
16
17
18
19
20
Tags
Dark Lord
Epic Game
File Encryption
File Transfer
Hacking Technique
Indie Game
Machine Gun
MITM Attack
Suspicious Activity
Warden Artifact
Featured stories
See all
How to Hide Files and Make Hidden Files Visible on OS X
An easy-to-follow guide on how to hide and view hidden files on Mac OS X.
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.