Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buying our over-priced stuff helps us keep things running. Peruse here.



Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS Feed




 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
EXE Hacker
Hacker Hack your way through the security softwares and defeat your enemies! In Hacker you will control various programs that have different abilites. Your goal is to advance from node to node and try to defeat all the security programs that include guards, scanners and firewalls. Use your credits to buy more programs from shops around the map and fuse them together to create even more powerful versions. Take control of every server you get your hands on and shut down the national defense core! Play the arena mode and try to defeat as many waves of enemy programs as possible. The game was greatly inspired by an old flash game called The Nightfall Incident. You should go check that out too. controls: WASD to move around in the map menu LMB to do stuff
4/5 4,143 Sep 28, 2016
Pixel Melody
Process Hacker v2.39
Process Hacker v2.39 A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Graphs and statistics allow you quickly to track down resource hogs and runaway processes. Use Ctrl+I to view system performance information. Move your cursor over a graph to get a tooltip with information about the data point under your cursor. You can double-click the graph to see information about the process at that data point, even if the process is no longer running. Can't edit or delete a file? Discover which processes are using that file. Use Ctrl+F to search for a handle or DLL. If all else fails, you can right-click an entry and close the handle associated with the file. However, this should only be used as a last resort and can lead to data loss and corruption. See what programs have active network connections, and close them if necessary. Use Ctrl+I to view system performance information. Move your cursor over a graph to get a tooltip with information about the data point under your cursor. You can double-click the graph to see information about the process at that data point, even if the process is no longer running. See a hightly detailed overview of system activity with highlighting. Add extra columns to show even more system activity and information! Get real-time information on disk access. This may look very similar to the Disk Activity feature in Resource Monitor, but Process Hacker has a few more features! Get real-time information on disk usage. Enable disk statistics for detailed disk usage information. View detailed stack traces with kernel-mode, WOW64 and .NET support. Hover your cursor over the first column (with the numbers) to view parameter and line number information when available. Get real-time information on network usage. Enable network adapter statistics for detailed information network usage information. Go beyond services.msc: create, edit and control services. By default, ...
5/5 98 Oct 26, 2021
Process Hacker Devs
Resource Hacker v5.1.8
Resource Hacker v5.1.8 Resource Hackerô has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both 32bit and 64bit Windows executables. Resource Hackerô can open any type of Windows executable (*.exe; *.dll; *.scr; *.mui etc) so that individual resources can be added modified or deleted within these files. Resource Hackerô can create and compile resource script files (*.rc), and edit resource files (*.res) too. Compiling: Compiling can be initiated either by passing a resource script file as a parameter on the the command line (see below), or by using Resource Hacker's text editor. Supported compiler directives include: #DEFINE, #UNDEF, #IF, #ELIF, #ELSE, #IFDEF, #IFNDEF, #INCLUDE, and #PRAGMA. The #INCLUDE, #IF, and #IFDEF directives can all be nested to multiple levels. Strings within resource statements are defined between double-quote (") characters. These strings can also contain typical 'C' style backslashed 'escaped' characters ó \t , , \\ , \" , and \000 .. \377 (octal). A double-quote within a string can be 'escaped' by preceding it with either a backslash or with another double-quote character. Script comments are preceded either by double forward-slashes (//) or by a semi-colon (;). Filenames in within resource statements can only be parsed as strings, so they MUST be enclosed within double-quote characters otherwise compile errors will be raised. A complete list of Resource-Definition Statements can be found here. Viewing Resources: Once a file has been opened, most resources will be displayed as either an image (or group of images) or as decompiled text: However, some resource types will be displayed in both its compiled form (eg dialog or popup menu) and in its decompiled text format. Some resource types can only be displayed as a dump of raw byte data: Using the internal editor to modify text-based resources: Dialog, menu, string-table, message-table, accelerators and Borland form resources can all be easily ...
5/5 3,106 Nov 17, 2020
Angus Johnson
Universal Radio Hacker v2.9.1
Universal Radio Hacker v2.9.1 The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks. Download user guide here. Instructional Video: This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the MacOS version, download here. If you need the Linux version, download here. Changes: v2.9.1 Dec 30, 2020 0c8f383 use *.wav format for demodulated signal export 8af7da3 change separation colors to green and magenta a3eceba fix disappearing separation area in demod view 6a7048c fix #829 7d2e41b fix overflow in AutoInterpretation for certain signals Click here to visit the author's website.
5/5 1,040 Feb 11, 2021
Dr. Johannes Pohl
   
Showing rows 1 to 4 of 4 Showing Page 1 of 1  1 


Copyright (c) 2021


Tweets by @GeekOnTheLoose