Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| Block Attack - Rise of the Blocks v2.5.0
Block Attack - Rise of the Blocks v2.5.0 Block Attack - Rise of the Blocks is a puzzle/blockfall game inspired by Nintendo’s Tetris Attack for the Super Nintendo. The game is pretty action packed for a puzzle game :-) The game is programmed by me (Poul Sander) and is released under the GPL license version 2. Features: Based on the classic “Tetris Attack” for the SNES 5 single player modes: Endless, Time Trial, Puzzle Mode, Stage Clear and Vs. Mode 2 two player options: Time Trial and Vs. Mode Puzzle mode has 30+ puzzles Players can use a custom key setup Handicap in (local)multi player High scores are saved Joypad support Music and sound effects Animations Puzzle level editor (written in Java) Select puzzle file from a list in the game Runs under Linux and Windows + more Save/Play Replay function Network play, you must know the IP address of the server (uses enet) Click here to visit the author's website.
|5,106||Dec 08, 2019
| Chainsaw v2.5.0
Chainsaw v2.5.0 Rapidly Search and Hunt through Windows Event Logs Chainsaw provides a powerful ‘first-response’ capability to quickly identify threats within Windows event logs. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in detection logic and via support for Sigma detection rules. Features 🔍 Search and extract event log records by event IDs, string matching, and regex patterns 🎯 Hunt for threats using Sigma detection rules and custom built-in detection logic ⚡ Lightning fast, written in rust, wrapping the EVTX parser library by @OBenamram 🔥 Document tagging (detection logic matching) provided by the TAU Engine Library 📑 Output in an ASCII table format, CSV format, or JSON format Hunting Logic Sigma Rule Matching Using the --rules and --mapping parameters you can specify a directory containing a subset of SIGMA detection rules (or just the entire SIGMA git repo) and chainsaw will automatically load, convert and run these rules against the provided event logs. The mapping file tells chainsaw what event IDs to run the detection rules against, and what fields are relevant. By default the following event IDs are supported: Built-In Logic Extraction and parsing of Windows Defender, F-Secure, Sophos, and Kaspersky AV alerts Detection of key event logs being cleared, or the event log service being stopped Users being created or added to sensitive user groups Brute-force of local user accounts RDP Logins You can specify the --lateral-all flag to chainsaw to also parse and extract additional 4624 logon types (network logons, service, batch etc.) relating to potential lateral movement that may be interesting for investigations. Getting Started You can use the pre-compiled versions of chainsaw ...
|1,717||Mar 17, 2023
| Tweaking.com - Hardware Identify (PORTABLE) v2.5.0
Tweaking.com - Hardware Identify (PORTABLE) v2.5.0 Tweaking.com - Hardware Identify will help identify unknown hardware on your system. This program does not help you download drivers but helps let you know what the hardware is, so you know what drivers to find. For example, say you just reinstalled a computer and the device manager shows multiple unknown hardware with no drivers installed. Well, you don't know what drivers to find since you don't know what the hardware is. Now with Tweaking.com - Hardware Identify you can see what that hardware is. The program also has an easy option to help improve the device database. Once you have all drivers installed, you can have the program check for any hardware on the system that isn't in the database and submit it to Tweaking.com. Within a few days, the database will be updated, and the device list will grow with the help of users like you! Changes: v2.5.0 Major changes to the graphics and controls of the program. Now supports high DPI systems and has improved graphics. Multiple bug fixes and improvements. Click here to visit the author's website.
|7,938||Jul 02, 2019
| Wifinian v2.5.0
Wifinian v2.5.0 More control over Wi-Fi connections! Wifinian is a Windows desktop tool to enable user to actively control Wi-Fi connections. Functions: Connect to or disconnect from a wireless network Rename a wireless profile Change automatic connection (Auto Connect) or automatic switch (Auto Switch) settings of a wireless profile Rush - Perform rescan of wireless networks in short intervals (The number indicates interval (sec).) Engage - Execute automatic connection depending on signal strength, order and automatic switch setting of wireless profiles (The number indicates threshold of signal strength (%).) Organize - Change the order (priority) of wireless profiles, delete a wireless profile Requirements Windows 7 or newer .NET Framework 4.8 Remarks To rename a wireless profile, press and hold its name. Rescan of wireless networks by OS itself is triggered by some actions and if no such actions take place, seems to be performed once per one minute. Automatic connection by Engage function applies only to wireless profiles whose automatic switch are enabled. If a profile whose automatic switch is not enabled has been already connected, automatic connection will not be executed. When you connect to a wireless network by OS's wireless menu, the order of wireless profiles may be automatically changed. A wireless profile is associated with a specific wireless adapter and if the adapter is not in place, such profile will not be shown. License MIT License How to delete wireless profiles from OS's GUI The GUI to delete wireless profiles has come back in Windows 8.1 Update. To reach this GUI, see the following. Windows 10 [Network settings] from notification area (or [Settings] from ...
|2,291||Dec 22, 2020
| WindTerm v2.5.0
WindTerm v2.5.0 A Quicker and better SSH/Telnet/Serial/Shell/Sftp client for DevOps. License Completely FREE for commercial and non-commercial use without limitations. All released source codes (except thirdparty directory) are provided under the terms of Apache-2.0 license. Introduction See Intro Videos https://kingtoolbox.github.io/ Screenshots Main Window (zsh): Split views: DigeWhite Theme: Features SSH, Telnet, Tcp, Shell, Serial SSH v2, Telnet, Raw Tcp, Serial, Shell protocols implemented. Supports SSH auto execution when session authenticated. Supports SSH ControlMaster. Supports SSH ProxyCommand or ProxyJump. Supports SSH agent forwarding. Supports SSH auto login with password, public-key, keyboard-interactive, gssapi-with-mic. Supports X11 forwarding. Supports direct/local port forwarding, reverse/remote port forwarding and dynamic port forwarding. Supports XModem, YModem and ZModem. Integrated sftp, scp client, supports download, upload, remove, rename, make new file/directory and so on. Integrated local file manager, supports move to, copy to, copy from, remove, rename, make new file/directory and so on. Supports Windows Cmd, PowerShell and Cmd, PowerShell as administrator. Supports Linux bash, zsh, powershell core and so on. Supports MacOS bash, zsh, powershell core and so on. GUI Supports Windows, MacOS and Linux. Supports Multilingual User Interface. Supports Unicode 13. Session dialog and session tree. Free Type Mode. Focus Mode. Sync Input. Enhanced protection of the session username and password. Command palette. Command sender. Explorer Pane. Shell Pane. Quick Bar. ...
|1,378||May 24, 2023
|Showing rows 1 to 5 of 5||Showing Page 1 of 1||1|
OlderGeeks.com Copyright (c) 2023