With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
A simple portable program that let you manage your P&P RPG NPC's
This program allows you to manage your NPC's using a social graph, each node is associated to a single NPC and each edge is a relation. For the moment, the project is aimed to manage Classical World of Darkness NPC's and most specifically for Vampire Campaigns, but it is easily adaptable with some basic JS and HTML5 knowledge.
We are moving towards a customizable version of this tool.
...Features a structured input description, integrity constraints and GUI.Independent parts of a job can execute in parallel on a cluster computer. Developed at Freiburg Brain Imaging (FBI) - http://fbi.uniklinik-freiburg.de/
Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.
Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
Have you ever seen a movie where someone just magically breaks in to the FBI using some terminal program that spits out nonsense in green text? Now you can do that too!
Heirarchy Hacker is a command-line tool for walking through any directory tree of hierarchical human-readable data files to make large, batch changes. The system is primarily designed for TASpring FBI/TDF files, with plans for future expansion.
A parody of sorts that allows you to simulate your own ISP, including network hardware, irate customers, and external pressures from folks like the FBI and the RIAA.