- Anti DDoS Guardian 5.0
 ...dows servers from DDoS attacks. It stops slow HTTP Get&Post attacks, Application (Layer 7) attacks, slowloris attacks, OWASP...
- Kushinara Incoming Packet Monitor 0.5
 screenshot | size: 2.1 MB | price: $0 | date: 3/29/2007 ...or designed to monitor SYN packets. Machines receive SYN packets when a remote machine is trying to initiate a TCP connection.   When a machine is listening on a port, it replies the machine sending the SYN pa...
- Any Office Password Recovery 5.0
 ...se while with powerful attack functions. It provides three types of password attack, brute-force attack, brut...
- FreeSweetGames Durak 3.1.40
 screenshot | size: 1.21 MB | price: $0 | date: 10/24/2010 ...may choose to pass the attack on clockwise around the table. In this case, the defender may only pass on the attack if he ha...
- Free RAR Password Cracker Expert 1.0
 screenshot | size: 14.89 MB | price: $19 | date: 10/28/2014 ...You can use 5 types of attacks to crack the RAR password.Brute Force, Masked Brute Force, Dictionary Attack, Smar...
- RAR Password Recovery 1.1 RC9
 ...orts the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program is able to resume the previous interrupted attack. ...
- PowerPoint Password 10.1.6805
 screenshot | size: 702 KB | price: $39 | date: 8/2/2005 ...and Hybrid  Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks (this dramatically speeds up Brute-Force attacks). An e...
- MD5 Password 1.0.292
 screenshot | size: 894 KB | price: $45 | date: 7/1/2006 ...taneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are s...
- Excel Password Recovery 1.0L
 ...orts the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (afte...
- XArp 2.0.0
 screenshot | size: 5.66 MB | price: $34.27 | date: 4/11/2008 ...atened by ARP spoofing attacks. Easy to use and powerful tools freely available allow anyone to perform ARP attacks and ea...
- Word Password Recovery 1.0M
 ...orts the "brute-force" attack, dictionary-based attack and dramatically fastest "Booost-Up" attack. The program automatically saves password searching state and can resume an interrupted attack (afte...
- 1st Email Anti-Virus 4.0
 screenshot | size: 975 KB | price: $19.95 | date: 4/24/2004 ...ader / CLSID extension attack, script attacks, ActiveX / Java / Flash attacks, "web bugs", fragmented message attack, and ...
- Office Password Unlocker 4.0.1.8
 ... Unlocker offers three attacks: brute-force attack, brute-force with mask attack, and dictionary attack based...
- OneNote Password 10.1.6805
 screenshot | size: 701 KB | price: $39 | date: 7/19/2005 ...and Hybrid  Dictionary attacks, Brute-Force attacks, and Smart-Force (TM) attacks (this dramatically speeds up Brute-Force attacks). An e...
- SHA-1 Password 1.0.292
 screenshot | size: 508 KB | price: $45 | date: 8/19/2006 ...taneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are s...
- JRecoverer for Oracle Database Passwords 1.4.0
 screenshot | size: 56.16 MB | price: $55 | date: 7/17/2015 ...overy using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Gener...
- JRecoverer for MySQL Passwords 1.4.0
 screenshot | size: 54.41 MB | price: $55 | date: 8/20/2015 ...overy using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Gener...
- 1st Ip Port Scanner 2.0
 screenshot | size: 1.04 MB | price: $29.95 | date: 11/16/2004 Ip Scanner,Port Scanner,Ip Finder,Ip Finder ...with three types ICMP, SYN an...
- Fastream IQ Content Proxy 7.1R
 screenshot | size: 9.99 MB | price: $79 | date: 11/2/2011 Complete forward/transparent proxy server suite for 32/64-bit Windows. ...AT, protected by DDoS, SYN an...
- CryptoBuster 1.0.823
 screenshot | size: 12.97 MB | price: $22.95 | date: 12/2/2021 Protects Your Data from Ransomware ...e data from ransomware attacks....
.