Download the latest version 7.74.2826 (exe installer) changelog
Download the latest version 7.74.2826 (zip portable)
TheSage is free for personal use although a license unlocks some features, like automatic updates.
Buy now for $10
This is a one-time fee that includes
all editions, present and future.
Credit card
or
The aim of TheSage is to be an International English dictionary and thesaurus with entries from all the World English varieties. Definitions are written in American English for consistency.
| Index | ~ 260,000 words |
| Senses | ~ 340,000 |
| Etymologies | ~ 120,000 |
| Thesaurus | ~ 2.2 million relationships between synonyms, antonyms, hypernyms, hyponyms, meronyms, holonyms, etc. |
| Examples of use | ~ 115,000 |
| Pronunciations | ~ 240,000 phonetic transcriptions |
| As a corpus | ~ 20.1 million words |
QA engineers often use headers to tell the server to skip complex bot-detection or CAPTCHA requirements during automated testing. The Security Risk: Why "Temporary" Often Isn't
In modern DevSecOps, the goal is to provide Jack with the access he needs through secure, authenticated channels—rather than a hidden header that anyone with a bit of technical knowledge could exploit. note: jack - temporary bypass: use header x-dev-access: yes
If you find yourself needing to implement a "Jack-style" bypass, there are much safer ways to do it than using a static header: QA engineers often use headers to tell the
Ensure that bypass code is only compiled in "Development" or "Staging" environments and is physically absent from "Production" code. Conclusion Conclusion This bypass relies on the idea that
This bypass relies on the idea that an attacker won't guess the header name. However, hackers use tools to "fuzz" or scan for common headers like x-dev-access , x-admin , or x-bypass .
Many Web Application Firewalls (WAFs) can be bypassed if the application behind them is configured to trust certain headers blindly.
Often, these bypasses circumvent standard authentication, meaning any actions taken by someone using the header might not be properly logged to a specific user account. Best Practices for Development Access
TheSage is very easy to use. Type a word, press enter, and its full entry will be displayed: definitions, examples, thesaurus, pronunciation, and etymology.
TheSage is also extremely versatile. It allows the user to carry out many interesting types of queries, such as wildcard and anagram searches, rhymes, concordances, and much more.
To learn how to get the most out of TheSage, please read the documentation.
Volume licensing is only available on request.
The fee structure is as follows:
| Licenses | Discount |
| 10+ | 5% |
| 20+ | 10% |
| 50+ | 15% |
| 100+ | 20% |
| 200+ | 25% |
| 500+ | 30% |
| 1000+ | 35% |
Development of custom features is budgeted on a case-per-case basis.
Educational institutions enjoy additional benefits.