Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
A threaded java MUD server with persistence in MySQL using sprocs. Uses command pattern and reflection for command parsing. NIO for networking. Excellent code comments. Map command uses visited rooms. Plans for configurable attack profiles per enemy.
Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
Spellcast is a game of wizards that fight in a tournament to the death. Each wizard must master spell casting to overcome their enemies and defend themselves from attack.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The Cyber Hordes is a single or multi-player RTS game where each player builds robots and gives them various components (weapons etc..) and then general orders (e.g. Attack), which the AI of the robot will attempt to complete on its own.
ADAM is the Active Defense Algorithm and Model. It is a formally defined process of determining appropriate active response actions in the event of an attack. This implementation shows that active defense can be a legitimate and responsible security tool
GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
A Tetris Attack Clone. *Not* classic tetris. Online multiplayer and limited IRC-style chat and game control. Available as both a Java applet and Java application. Registered on www.jars.com.
Java-tradewars Attack Terminal - A helper for the popular text game TradeWars 2002 written in Java. This program can be used as an applet on a board website or as a stand alone program.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Avatar - The Last Airbender You are an element bender
Avatar - The Last Airbender
You are an element bender, you are one of the 4 factions in the world, Earth Air Fire Water,
protect your homeland, learn all you can, and maybe you can become an Avatar and rule all 4 elements.