With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
Evil threatens to overrun the world. The situation is without hope.
The only chance for saving the world is slaying Xyljasf, the overlord of the invasion. Unfortunately, he is directly at the heart of the invasion at the bottom of the cursed dungeons below the mountains of Belemar.
Bad luck, that Xyljasf himself is a Demon Halfgod of incredible power.
There is no army nearby to do the deed and all heroes with some brain have already fled to some tavern far off. So it is up to you, some...
The Dark Millennium List Builder is a tool for use with the tabletop wargame, Warhammer 40,000, by Games Workshop. With the aid of this program a user can easier craft army lists for use in the game.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Lead your outcast vikings from starvation into a thriving economy. Feed your army, research technologies, conquer islands, and trade with faraway countries.
You win when you are the sole kingdom on the map.
Open ArmyBuilder is an open-source implementation of the commercial product ArmyBuilder, hosted at wolflair.com. The application is a tool used to create and maintain army rosters for miniature based war- and strategygames such as Warhammer.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Aerial Death put you on the skin of John Hellborn, a xpert pilot of the American army that is testing prototipes. One of the prototipes, has been stolen, and you need to recover it.
Fast, compact, asynchronous Java remote method invocation system. Alternative to Java RMI. Pronounced "army". Use it when you would use RMI, but you want to go over a modem connection, or if you need asynchronous invocation and return value processi
DNScat is a "swiss-army knife" tool to tunnel traffic through DNS servers. It is a small, yet powerfull tool, similar to netcat. In conjunction with PPP server, it allows to build a VPN using DNS packets. DNScat is a useful tool for penetration testing.
Web Based Stratagy game. Based in space you explore, research and build your army. This is a war game so is based on mainly attacking but team play is also encouraged in systems and alliances.
AABrowse is a server browser for America's Army written in QT. It supports both Gamespy and Andromeda master servers, buddy lists, favourites, and player search.
NBTView is a 'NetBIOS Swiss Army Knife' written in C, and usable under several UNIX-like systems. NBTView allows you to passively monitor NetBIOS intelligence (users logged in, shares, etc.), run queries against machines, and brute-force share passwords.
CPU is meant to be a swiss army knife for administrators who are currently using or wanting to use an LDAP backend for user authentication. This project allows for easy user administration of LDAP users and allows for user and group mods, deletes and add
Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
An IRC-Bot coded in PHP for use in standard ircserver networks with modular construction and object oriented programming. Various channel functions and standard logfile format makes this bot a swiss army knife for channel operators and easy to extend.
JEST will be the Java bytecode engineering Swiss-Army Jackhammer.
It will include a disassembler, class browser, obfuscator, optimizer, class editor, and bytecode debugger, and have an intuitive GUI.