Software Listing of Author : ""

  • Athena
  • License: Freeware
  • Price: -

Athena - History finder Previously a private program written a year or so back. I didn't release it publically as it'd just kill passes - but seeing as staph was later released doing a similar thing I guess there's no harm in giving this to a wider audience now.This program is a simple history finder.Searches google looking for pass dumps and downloading logins in the form of run it'll create 3 files.logins.txt - contains the above sites.txt - contains a list of sites it has tried to leech from - to save looking at the same ones again. good_sites.txt - contains a list of sites it has succesfully downloaded logins from. You can use this as a leech list if you like.. .

  • Platform: WinOther
  • Azarius
  • License: Freeware
  • Price: -

Azarius - a little utility to sort exploit history results by the script name and not the URL Azarius is a little utility to sort exploit history results by the script name and not the URL.Here are some key features of "Azarius":Load in your list (right click menu)Sort it (click on the column)Save (right click menu). .

  • Platform: WinOther
  • Charon
  • License: Freeware
  • Price: -

Charon searches for proxy servers and tests their anonymity. Includes a custom filter for dangerous (fbi/gov/army) ranges Charon is a multipurpose proxy program. Charon will search google for publically posted proxy lists and incorporate an environmental checker to verify their anonymity / functionality. Filtering support is added by means of user-customisable lists to eliminate proxies such as those run by educational / military / government authorities.Included within the kit is a php checker which can be uploaded to your own webspace to spread the processor load and bandwidth of the actual testing. This is fully integrated into Charon where it will simply send your pages lists of proxies and harvest the results.. .

  • Platform: WinOther
  • LogRip
  • License: Freeware
  • Price: -

Logrip - logfile analyser It analyses website log files and extracts certain information.Here are some key features of "LogRip":IP's - any numeric IP'sPaths - extracts any paths found in the fileLines - extracts whole linesUsernames - extracts usernames from the most common file formatsDuplicates removerNote: If the same word is selected in both "save line" and "remove line" the remove will take precedence.Note: Selecting whole lines but not selecting "remove lines with" or "save lines with" will create a copy of the original file - not terribly productive. .

  • Platform: WinOther

Lucifer Wordlist Filter will filter and generate wordlists to match the format of currently valid hits This is a program which will filter and generate wordlists to match the format of currently valid hits.You can either enter rules manually, or have it automatically create them from a "hit list"Buttons are fairly self explanatory, but the rules it follows are:c = Lower case characterC = Upper case charactern = Numeric character? = Any other character (Or the three above for generation). .

  • Platform: WinOther
  • Triton
  • License: Freeware
  • Price: -

Triton is what is known as an This program is what is known as an "exploiter". It can be used to probe websites for possible vulnerabilities based on user-customisable pre-defined lists. This is a follow up to the popular Triton 0.3 program with a great number of improvements.You should use this program should only against sites where you have the permission to do so.. .

  • Platform: WinOther
New Reviews

Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...

Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...

SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...

TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...

New Downloads

WidsMob Viewer

WidsMob Viewer is an excellent
photo viewing software with
super fast speed and excellent
experience. There are
different ...

SoftPerfect Cache Relocator

Moving Internet browser cache
folder to a RAM disk can speed
up browsing, offload the HDD
and reduce SSD wear-and-tear.

GS1 DataBar JavaScript

Generate BMP, HTML5 Canvas,
SVG and DataBar barcode images
with JavaScript Barcode
Generator that may be easily

Privacy Drive

Privacy Drive is an on-the-fly
encryption software to lock,
hide and encrypt all kind of
pictures, videos, documents,


A rapid prototyping tool to
make prototypes faster,
smarter and easier for all
(Android/iOS/PC/Mac/Web): Fast


Finally the solution to
convert your transaction files
into a readable format ready
to archive or print. Convert
QIF to ...

Yodot MOV Repair for

Yodot MOV Repair for Windows
is read-only software to
safely fix corrupted or
damaged MOV video files on
Windows PC ...

EasyBilling Maker of Sales

Create professional sales
documents, Quotations,
Invoices, Receipts, Delivery
Note, Credit Note and Debit
Note. Allows to ...


FolderMill monitors a folder
and automatically prints or
converts to PDF, JPG or TIFF
all new documents. Just define

MailShelf Pro

MailShelf Pro is a
professional email archiving
solution that covers all
important aspects of a secure
and compliant ...