exploits downloads

Malwarebytes Anti-Exploit

1.13.1.585 download

... of security around popular browsers and applications, preventing exploits from compromising vulnerable code. Not an antivirus, but compatible with most antivirus, Malwarebytes Anti-Exploit is a small, specialized shield designed to ...

Malzilla

1.2.0 download

Web pages that contain exploits often use a series of redirects and obfuscated ... Malware Domain List says: "Web pages that contain exploits often use a series of redirects and obfuscated

Dungeon Scroll Gold Edition

2.00 download

... and even a dragon or two share your exploits with the global score system. Snazzy sound, sweet action, and rock solid gameplay make this game an addiction that will actually ...

Identity Protection

1.5 download

... even scan your computer for possible Windows security exploits and insecure security policies. Identity Protection is powered by a sleek, graphical user interface that gives you point and click access ...

Heimdal PRO

2.2.9 download

... against advanced malware attacks, phishing attempts, data leakage, exploits and Zero Day attacks. Heimdal PRO is especially effective against financial malware and the most sophisticated forms of malware, which go ...

Metasploit Framework

6.4.42 download

... scripting environment that supports a wide array of exploits, payloads, and auxiliary modules. Its modular architecture allows ... updated exploit database. This repository includes thousands of exploits for known vulnerabilities, enabling testers to simulate real-world ...

New Version

Metasploit Pro

4.22.4 (September 16 download

... core, Metasploit Pro offers an extensive library of exploits, payloads, and auxiliary modules, enabling users to simulate ... Detailed, customizable reports provide clear insights into vulnerabilities, exploits used, and remediation steps, making it easier to ...

BMDFM

5.9.9_R21_b2108 download

... execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly DYNAMIC SCHEDULING of the data flow instruction sequences derived from the formerly sequential program ...

Harmonic Manipulator

0.9.6.1 download

... in a geodetic or geocentric reference system). It exploits basic parallelism using openmp directives. A solution with MPI has not be taken into account since it cannot be so ...

Harmonic Manipulator for Mac OS X

0.9.6.1 download

... in a geodetic or geocentric reference system). It exploits basic parallelism using openmp directives. A solution with MPI has not be taken into account since it cannot be so ...

TuCSoN

1.12.0.0301 download

... technology that helps coordinate Internet agents. TuCSoN exploits a notion of local tuple-based interaction space, called tuple centre, which is a tuple space enhanced with the notion of behaviour ...

Tibia Client

11 download

... explore areas, solve tricky riddles and undertake heroic exploits. For more than 10 years now, players have been visiting the medieval world of Tibia. At present, more than 250,000 ...

Tibia Client for Linux

11 download

... explore areas, solve tricky riddles and undertake heroic exploits. For more than 10 years now, players have been visiting the medieval world of Tibia. At present, more than 250,000 ...

ArtisBrowser

27.11.1 download

... other Internet content without data leakage and other exploits enabled by modern web browsers. Fully compatible with all web applications and programming languages. Whether you intend to add copy protection ...

Sim Card Data Recovery Utility

8.0.0.8 download

Elegant sim card memory restoration program restores lost records even after some occurrences like accidentally deleted data, formatted/reformatted sim cards, bad sector in sim cards, improper device usage, unexpected worm or ...

Twister Anti-TrojanVirus

8.16 download

... Privacy Protection, Threat Traps - System Shields, Anti-0day Exploits, Anti-BSOD -Resumable Scan, iSmart-Scan, Resource Balancing - Speech ... Prevent Blue Screen of Death, and block 0-day exploits. Multi-Skin Multimedia animation interface, multi-style UI. ...

Turbo-Mailer

2.7.10 download

... from Excel table columns) · Multi-parallel SMTP (multi-threaded) exploits the bandwidth best for big mailing jobs · BCC option reduces network traffic · Automatic charset/unicode mail transfer · Wide unicode ...

ESET Smart Security (32 bit)

17.1.13.0 download

... to avoid detection—as well as browser and application exploits. ESET HELPS TRACK AND LOCATE YOUR MISSING LAPTOP If you lose your device, don't lose your head. There is ...

ESET Smart Security (64 bit)

17.1.13.0 download

... to avoid detection—as well as browser and application exploits. ESET HELPS TRACK AND LOCATE YOUR MISSING LAPTOP If you lose your device, don't lose your head. There is ...

Pegasus Mail

4.73.639 download

... bugs. Pegasus Mail is immune to *all* the exploits that affect the "other" mailer - browse your mail with genuine confidence. · View your folders in either a multi-pane mode ...

ZoneAlarm Extreme Security 2010

9.3.037.000 download

... against malicious software like drive-by downloads and browser exploits.more info Unified Scan Engine Makes superior detection and removal of viruses, spyware, Trojan horses, worms, bots, and other malicious software ...

Panda Antivirus for Netbooks

9.01 download

... blocks known and unknown hacker attacks and vulnerability exploits. Identity Theft Protection Anti-Rootkit Technology IMPROVED! Detects and removes silently-installed rootkits used by malware or hackers to evade ...

BluePoint Security

1.0.3.99 download

... of a stealthy drive-by download or any other exploits. Threats don't stand a chance with BluePoint's lockdown approach to security. No other security package can offer you this! ...

Turbo-Mailer for Linux

2.7.10 download

... from Excel table columns) · Multi-parallel SMTP (multi-threaded) exploits the bandwidth best for big mailing jobs · BCC option reduces network traffic · Automatic charset/unicode mail transfer · Wide unicode ...

Trend Micro Virus Pattern File

December 19, 2024 download

... analysis, the software can detect and mitigate zero-day exploits and other sophisticated attacks that traditional signature-based methods might miss. This proactive approach ensures that even the most cunning cyber threats ...

New Version