Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Display: short descriptions | full descriptions
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, microphone, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a spy camera. Automatically sends logs to your email.
  • An army of the undead attacked the defenseless village of cute kittens, which had never had to defend their lands. They first took up their swords to ward off the damned beasts. There is a set of unique units, and as much as 3 lines of defense, so whether or not the cute kittens can withstand the onslaught of the enemy is up to you.
  • > WinSleep Monitor by MollieSoft is the remote viewer for WinSleep. > Shows WinSleep programs running on any number of remote computers, including timeline graphs and sleep journals. > Sleep/Hibernate/Wake remotely. > Connects to WinSleep clients by IP address or computer name. > Connection is encrypted and secure: WinSleep authorizes the attempted connection by monitor IP address, monitor computer name, or by password. > See your WinSleep from anywhere in the world!
  • English Words Teacher - is an app for beginners to learn and practice English words. It uses a British speaker.
  • SpyPal Keylogger secrectly records Facebook, keystrokes, screenshots, websites visited, applications, Skype, Yahoo Messenger, clipboard, passwords, emails, documents, microphone and more. In Stealth Mode, it is completely invisible to monitored users. Use hotkey and password to access the program. Automatically sends logs to your email or ftp every x seconds. Perfect for monitoring employees, children, spouse and investigating crimes.
  • Audit and recovery of Microsoft SQL Server passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Power Spy secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, microphone, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends logs to your email or ftp. Starts monitoring with system startup. Perfect for parental control, monitoring employees or catching cheaters.
  • Power Spy (Supports x64/x86) secretly logs all Facebook, keystrokes, chats, emails, web visits, web cam images, user names, passwords, searches, microphone and more. It supports Windows Live Messenger, Skype, Yahoo Messenger, ICQ and other IMs. It sends log reports to your email or ftp. You can check logs on another PC or your cell phone. Perfect for catching cheaters, monitoring employees, children and spouse and even investigating crimes.
  • Batch & Print Enterprise is for batch printing documents from a retainable list which can be automatically printed in document sequence of your choice, All associated shell printable documents are supported, e.g. PDF, MS Word, HTML, Text Files, Image formats, Excel Spreadsheets, PowerPoint Presentations and many more. The Enterprise version features multi core, multi-threaded processing and multi-threaded printing for printing large scale.
  • Gain full access to information stored in FileVault 2 containers, iOS, Apple iCloud, Windows Phone and BlackBerry 10 devices! Download device backups and synced data from Apple iCloud, Microsoft OneDrive and BlackBerry 10 servers. Use Apple ID and password or extract binary authentication tokens from computers, hard drives and disk images to download iCloud data without a password. Decrypt iOS backups with GPU-accelerated password recovery.
  • Cloud secure allows you to password protect cloud folders on your PC. It works with Google Drive, One Drive, Dropbox and Box. It keeps your cloud files and folders synced, backed up and password-protected. Cloud secure is a comprehensive solution for users who don't want others tampering with their important files and folders saved in their cloud accounts.
  • The VBScript editor and debugger that lets you add VBScript macros to your C++, C#, VB.Net or Delphi application. Features include Syntax coloring, Built-in debugger, Auto-capitalize and Auto-completion features (list object members, display parameters info, complete words), Dynamic help (If you press F1, help is provided for the word under the cursor), Code snippets, Object browser. Visit embedded.vbsedit.com
  • Elcomsoft Phone Viewer is a fast, lightweight forensic viewer for quickly accessing information extracted from mobile backups. Supporting a variety of platforms and data formats, the tool can display information extracted from local and cloud iOS, Windows Phone and BlackBerry 10 backups. Password-protected iTunes backups can be automatically decrypted and analyzed without using third-party tools.
  • Outlook, Live Mail, Outlook Express Bayesian spam filter. Allow or block email addresses, IP's, words/phrases you choose. Block spam by country and language. Bounce spam back to spammers. Report spammers. Auto delete spam. Forward only good emails to your phone. Send challenge emails to unfamiliar emailers. Stats. Convert the toolbar into English, Spanish, French, Italian, German, Russian. Customizable.
  • Power Spy Software secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.
  • Do you think that "betrayal"is just a big word? Do you think if you're the best, you will always stay on top? Do you really think if you know the secrets and you alone, then you will be left alone? If only.. I took part in the raid to seize nukes ... and was betrayed. Now I'm somewhere in the catacombs, lost in the desert with next to no visibility. But ... perhaps, you can get out of this jam? - A mysterious shooter with puzzle elements and ...
  • End of the world, or a new beginning? In the middle of the 21st century, a series of catastrophic events led to the death of civilization. It all started with a natural anomaly. The sky over the entire was enveloped by fiery red clouds that burst into flames. And then it was black. The sunlight faded, unable to break through the thick haze that followed. "The eternal night" enveloped the world.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Super Keylogger is a professional yet very easy to use invisible keylogger for big and small companies, network administrators, concerned parents and PC owners. Super Keylogger includes several integrated recording modules that monitor: chat convos, e-mails, Internet history, keystrokes recorder, passwords! For more details: www.superkeylogger.com
  • Audit and recovery of PostgreSQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks. Generation of reports on recovered passwords.
  • Power Spy Lite secretly logs Facebook, Skype, keystrokes, chats & IMs, emails, web visits, video talk, logins, passwords, applications, searches and more. It also takes screenshots like a surveillance camera. Lets you know exactly what they do on a computer screen while you are away. Automatically sends log reports to your email. Starts monitoring with system startup. Runs silently and invisibly.
  • Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
  • Do you like fruit salads? So does the hero of this game, and so today you will whip one up. But the method of cutting it is somewhat different from what we are used to. Instead of a knife, the hero of this game uses a sharp sword, and instead of cutting on a board, throws fruit in the air. Your task is to help him cut up all the fruit into small pieces. But please, be careful and beware of bombs which can break the sword. Good luck!
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Power Spy Keylogger secretly logs Facebook, keystrokes, chats, IMs, emails, websites visited, microphone, video talk, logins, passwords, applications, searches, documents and more. Logs Skype, Yahoo Messenger, ICQ, AIM, etc. Takes screenshots every x seconds like a spy cam. Sends logs to your email. You can check logs on a remote PC, tablet, smart phone, or directly on the monitored PC. Perfect for monitoring employees, kids and spouse.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2017 IT Shareware