Free Exploits Downloads

Morgan M-JPEG codec is a Windows video codec

Morgan Multimedia MJPEG Codec

Morgan Multimedia

Morgan M-JPEG is a video codec. This third version is particularly optimized for Intel and AMD last generation CPU and Windows XP and 2000 operating systems but it is even fully optimized for older CPU and older Windows versions

dc10 jpeg codec windows xp exploits yuy2 uyvy pentium 4

Protect your computer from I-worms & hackers

Anti-Cracker Shield

SoftSphere Technologies

Protect your computer from Internet worms and hackers'' attacks, which become possible due to the operational system and software vulnerabilities ("exploits"). Neither antiviruses, nor firewalls can protect from exploits!

security system hacker computer hackers firewalls internet worms software vulnerabilities

The hacker game

Hacker Evolution

exosyphen studios

Play the role of Brian Spencer, a former intelligence agent, against a complex enemy created by an artificial intelligence. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer wizard.

computer security crash gamer evolution intelligence agent freelance jobs

Keep your PC fine-tuned, secure and more.

Compu-Rx Computer Maintenance Package


Keep your PC fine-tuned and secure with this all-in-one package: clean up your hard drive, remove malicious spyware, backup your email, address book, Internet bookmark favorites, desktop settings, files, folders, speed up your programs, and more.

temporary internet files internet today windows files internet protection necessary functions right tools

A firewall and proxy-server application

Irbis Firewall

Irbis Software

A firewall and proxy-server application intended for protecting computers running Windows 2000/XP against network attacks, exercising control over Internet access, filtering dangerous and useless web-content, and more...

proxy server exploits web content service mode navigation speed gui interface

Tools to protect your Computer's Security.

Identity Protection

Infiltration Systems

Identity Protection is a powerful security suite for protecting your computer and internet identity from hackers. Utilities included can remove adware/spyware, scan your computer for exploits, clear your internet tracks, and secure sensitive data.

internet identity encrypt files spyware protection features windows security graphical user interface

Network Security Scanning and Auditing

Infiltrator Network Security Scanner

Infiltration Systems

Infiltrator is an intuitive network security scanner that can quickly audit computers for vulnerabilities, security holes and exploits, and information enumerations. Infiltrator can reveal security holes and alert the user.

network utilities network security scanner netbios cgi server open ports infiltrator

Great treat for all 3D game lovers. Try FREE!

Dino and Aliens


Not all dinosaurs have died out. Our little bomb-throwing Dino has survived to protect us from the alien invasion. He knows how to stand up for himself and is not afraid to take on even the toughest enemies. Download your FREE trial version now.

unexpected surprises monsters inc 3d gaming distant planet electric piano arsenal

reads out ICQ Database (.DAT) files

ICQr Information

Moritz Bartl

ICQr Information is able to read and reveal personal information stored in ICQ Database (DAT) files, such as nickname, passwords, address, birthday and much more.

icq freeware tool reveal database files contact list elements

Binary Modular DataFlow Machine



BMDFM (Binary Modular DataFlow Machine) is software, which enables running an application in parallel on shared memory symmetric multiprocessors (SMP) using the multiple processors to speed up the execution of single applications.

mips irix hp ux dfm alpha tru64 intel


Page 1 out of 2    1 2


Copyright © 2003-2012 TverSoft Software