In game development, it’s common to use spritesheets for animation, but this technique isn’t as widely used on the web. Which is a shame, because we can do some pretty cool stuff with sprites! In this post, we’ll share the niche CSS function you can use to leverage this technique, and explore some of the potential use cases.
The quality of free plugins just keeps getting better. These are the best free plugins for 2026.
We really are spoiled for choice. Not only are paid plugins better than ever, with analog-style instruments sounding more realistic every year, and hardware emulations of classic gear making in-the-box production that much more professional-sounding, we’re also blessed with a plethora of free ones. It’s a veritable VST smorgasbord out there. So much so, in fact, that it can be hard to know what’s worth downloading and what’s not.
Here’s a list, then, of what you need to have in your AU and VST folders. These are the best free plugins for 2026 presented in no specific order. Instruments and effects, they’re all here. And all free.
Vital Audio Vital
Of course, we have to start this list with Vital from Vital Audio, aka Matt Tytel. Although it’s not the new kid on the block anymore, Vital remains a (wait for it) vital wavetable synth to rival the big dogs like Serum and Pigments. And while there are paid variants, the free version is just as good, complete with morphing wavetables, stereo modulation, keytracking LFOs, MPE and all the other good stuff. You just don’t get as many wavetables and presets as in the paid versions.
You’re probably familiar with Surge, the freeware super synth maintained by a team of dedicated coders. While it certainly could sit comfortably on a list of the best plugins of 2026, we’ve decided to give its seat instead to OB-Xf, an emulation of the Oberheim OB-X built by the same Surge Team.
If OB-Xf sounds familiar, that’s because it started from the same code as OB-Xd, the classic freeware synth now stewarded by discoDSP. discoDSP has made the (rather unpopular) decision to charge for OB-Xd, so now Surge Team has forked the original code and continued development. It’s currently in beta, so downloader beware, but it sounds great and will tick all those Obie boxes for you.
And if you’re in need of a new freeware sampler, check out the just-announced Shortcircuit-XT from the same people.
When it comes to algorithmic software reverbs, you can’t beat Valhalla. Sure, there are better — but they’re also more expensive. Valhalla only charges $50 for its effects plugins. But free is even better than cheap, and that’s what Supermassive is.
Supermassive is (as the name suggests) best for huge reverbs. You know, the kind that YouTube synthfluencers drown their demos in to make themselves sound better. Or you can use it to turn any sound into a pad. It’s also got a delay circuit that specializes in huge feedback washes.
And Valhalla keeps updating it. There are now a whopping 22 modes of reverb/delay to play with. Massively essential.
Dynamic EQ isn’t the rare beast that it once was. Nova from Tokyo Dawn Records (that’s TDR to you and me) used to be one of the few available EQs with dynamics built in. Although that’s changed, Nova is still very much worth the download, chiefly because it’s so darned easy to use. Even if you’ve never tried a dynamic EQ, you’ll be ducking frequency bands to the sidechain input in no time at all.
Although the four bands you get in the gratis version will probably be enough to work with, you can level up to the paid Gentlemen’s Edition (€60) for two more nodes and other additional functionality.
Xfer Records is best known as the developer of the world-beating Serum, which has had such an outsized influence on electronic music it’s not even funny. Serum isn’t the team’s only product, though. Along with paid plugins like the excellent LFO Tool, there’s also OTT, which may rival Serum in terms of appearances on tracks. (It’s so common, even FabFilter has aped it in its recent Pro-C 3.)
A multiband compressor, OTT uses simultaneous downward and upward compression across three bands to generate monstrous results. It’s not called Over The Top for nothing.
A good LFO tool is indispensable. While there are plenty available that are capable of all kinds of craziness, if you just need something to handle basic volume ducking duties and the occasional filter wobble and don’t feel like laying out any cash, Flux Mini 2 from Caelum Audio fits the bill perfectly.
Based on the bigger and more powerful Flux Pro, Flux Mini 2 lets you draw in LFO curves to affect filter cutoff (low-, high- or bandpass), filter resonance, and mix, but the one you’ll probably use the most is amplitude for sidechain-style volume modulation. Plus, it can send MIDI CCs to control other plugins.
Spitfire Audio’s LABS was a fantastic, free and ever-growing plugin packed full of unique and very usable Spitfire sampled instruments. And then it went paid (as LABS+). Now, thanks to Splice owning Spitfire, it’s back again in the form of Instrument, a freemium plugin with a free tier that revives LABS and adds new monthly instruments. (If you want more, you can upgrade to one of two paid levels with access to exclusive content and credits to use across Splice.)
How much you want to engage with the Splice ecosystem is up to you, but the free content in Instrument is nothing short of fantastic. This is Spitfire we’re talking about, after all, with sounds that include a piano recorded at Philip Glass’ home, drum performances by session musician Abe Laboriel Jr., and the BBC Symphony Orchestra captured at Maida Vale Studios.
Two years ago, we called Zyklop from Dawesome one of the best secret sauce plugins of 2024. It certainly still is that, and it’s also one of the best free plugins for 2026.
Based on the bigger Myth instrument, Zyklop uses resynthesis to transform any sound you throw at it into a complex waveform that you can then use in a traditional-style synthesizer. While you only get a single oscillator, Zyklopdoes offer eight voices and enough synthesis modules and effects to be very useful. It also sounds amazing: wild and like nothing else really.
OK, this is a big one. Usual Suspects is a crack team of mad geniuses that figured out how to emulate the Motorola DSP chips found in 1990s synthesizers like the Access Virus series, Waldorf Micro Q and Microwave 2, and Clavia Nord Lead 2X. Recently, they managed to reverse-engineer the Toshiba chip in the Roland JP-8000, perhaps the most famous of the era’s virtual analog synths and the progenitor of the supersaw wave.
If you’re unfamiliar with the Usual Suspect’s work, these are chip emulators, not software recreations of synthesizers. That is, they host the actual ROM from the original instruments. Without this, you won’t hear a sound. And, as this is a legal gray area, we can’t tell you where to get the ROM. But once you do find it, you’ll have the original JP-8000 in your DAW. What a crazy world we live in.
For this last one, we’re going to recommend a developer rather than a single plugin. Because you really need to know about Ewan Bristow.
Ewan Bristow has really blown up in the last year. He makes what he calls “weird audio devices” and they really do live up to that description. There’s a spectral delay, spectral resynthesis sound manipulator, cepstral morphing (we’d be lying if we said we knew what that was), a spectral filter that converts wavetables into filter shapes, and much more. His work is universally unique and excellent-sounding.
The only catch is these are plugdata patches, not discrete plugins, so they need to be run in the (also free) plugdata programming environment. But you can use Ewan’s creations as you would a plugin, you just need to load the plugdata VST first. Sort of like an ensemble inside Reaktor. (Update: Ewan is now doing regular plugins too! Check them out here.)
sandbox-exec is a built-in macOS command-line utility that enables users to execute applications within a sandboxed environment. In essence, it creates a secure, isolated space where applications can run with limited access to system resources – only accessing what you explicitly permit.
The concept behind sandboxing is fundamental to modern security: by restricting what an application can access, you minimize the potential damage from malicious code or unintended behavior. Think of it as putting an application in a secure room where it can only interact with specific objects you've placed there.
Benefits of Application Sandboxing
Before diving into usage, let's understand why sandboxing matters:
Protection from malicious code: If you're testing an unfamiliar application or script, sandboxing can prevent it from accessing sensitive files or sending data across the network.
Damage limitation: Even trusted applications can have vulnerabilities. Sandboxing limits the potential impact if an application is compromised.
Privacy control: You can explicitly deny applications access to personal directories like Documents, Photos, or Contacts.
Testing environment: Developers can test how applications function with limited permissions before implementing formal App Sandbox entitlements.
Resource restriction: Beyond security, sandboxing can limit an application's resource consumption or network access.
Getting Started with sandbox-exec
Using sandbox-exec requires creating a sandbox profile (configuration file) that defines the rules for your secure environment. The basic syntax is:
sandbox-exec-fprofile.sbcommand_to_run
Where profile.sb contains the rules defining what the sandboxed application can and cannot do, and command_to_run is the application you want to run within those constraints.
Understanding Sandbox Profiles
Sandbox profiles use a Scheme-like syntax (a LISP dialect) with parentheses grouping expressions. The basic structure includes:
A version declaration: (version 1)
Default policy: (deny default) or (allow default)
Specific rules allowing or denying operations
Rules can target specific resources using:
Literal paths: (literal "/path/to/file")
Regular expressions: (regex "^/System")
Glob patterns: (subpath "/Library")
See Appendix for more complete list of available rules
Two Fundamental Approaches to Sandboxing
There are two primary philosophies when creating sandbox profiles:
1. Deny by Default (Most Secure)
This approach starts by denying everything and explicitly allowing only required operations:
This creates a terminal session that functions normally but cannot access the network or read from your personal directories.
Example: Using Pre-built System Profiles
macOS includes several pre-built sandbox profiles in /System/Library/Sandbox/Profiles:
# Run a command with the system's no-network profile
sandbox-exec-f/System/Library/Sandbox/Profiles/weatherd.sbcommand
These system profiles provide configurations for common restriction scenarios and applications. Some of them have quite good comments so you can use it as basis for your future profiles.
Debugging Sandbox Issues
When applications fail in a sandbox, determining the cause can be challenging. Here are effective debugging techniques:
Using the Console App
Open Console.app (Applications → Utilities → Console)
Search for "sandbox" and your application name
Look for lines containing "deny" to identify blocked operations
logstream--stylecompact--predicate'sender=="Sandbox" and eventMessage contains "python"'
These logs show exactly which operations are being denied, helping you refine your sandbox profile.
Advanced Sandbox Techniques
Creating a Sandbox Alias
For frequent sandboxing, add an alias to your shell configuration:
# Add to ~/.zshrc or ~/.bash_profilealiassandbox-no-network='sandbox-exec -p "(version 1)(allow default)(deny network*)"'# Then use it as:
sandbox-no-networkcurl-v<a href="https://google.com" rel="nofollow">https://google.com</a>
but when I did the same for UI applications it didn't work for some reason (I can still open Google.com):
Despite its power, sandbox-exec has some limitations to consider:
Deprecation status: While functional, Apple discourages its direct use in favor of App Sandbox for developers.
Complex applications: Modern applications often have complex requirements that make comprehensive sandboxing challenging without extensive testing.
Trial and error: Creating effective sandbox profiles often requires iterative testing to identify all necessary permissions.
No GUI: Unlike App Sandbox in Xcode, sandbox-exec has no graphical interface for configuration.
System updates: Major macOS updates might change how sandbox-exec works or what rules are effective.
While Apple has moved toward more user-friendly security models, sandbox-exec remains a powerful tool for those willing to invest time in learning its intricacies. It offers a level of control and customization that GUI-based solutions simply cannot match.
For security-conscious users, developers testing applications, or anyone working with potentially untrusted code, sandbox-exec provides a native macOS solution for creating finely-tuned security environments. Though it requires knowledge of all it's possibility, despite lack of documentation, the security benefits make it well worth the effort.
The most powerful aspect of sandbox-exec is its flexibility – you can create custom security profiles tailored to specific applications and use cases, going far beyond the one-size-fits-all approach of most security tools.
What's Next
If you're interested in learning more about macOS security tools and techniques, check out Apple's official documentation on App Sandbox or explore the pre-built sandbox profiles in /System/Library/Sandbox/Profiles to see how Apple implements sandboxing for system services
Hold ⇧⌥ to adjust display brightness, volume or keyboard brightness in quarter-increments. This is useful when the lowest click is still too bright or loud.
A quick way to access your Displays settings is to ⌥-press either brightness up or brightness down.
Same goes for Sound settings: ⌥-press mute or volume up/down.
Again with Keyboard settings: ⌥keyboard brightness up/down.
(Works with Touch Bar too! ⌥-tap the corresponding button in the Control Strip.)
In Finder, hold ⌥ to Get Info on all selected items in one Inspector window, rather than in a barrage of individual Info windows. This also works with ⌥⌘I (instead of ⌘I).
In any Save sheet, drag and drop a folder onto the sheet to navigate there in the Save sheet. Drag and drop a file to navigate there and prepopulate the Save As field with its filename.
You may already know about the Go to Folder… menu item (⇧⌘G) in a normal Finder window. This is even quicker to invoke from an New/Open/Save dialogue: just hit /. (The usual shortcut still works.)
Change the icon of any Finder item: Copy any image or .icns file, Get Info on any item in Finder, click to select the icon in the top left, and paste! Or simply drag & drop an image or .icns onto the icon.
Relatedly, you can even copy the icon from one file’s Info panel to paste into another.
Also relatedly, a bunch of the system icons live in /System/Library/CoreServices/CoreTypes.bundle/Contents/Resources/.
When macOS says you’ve spelled something wrong, and you right-click then choose Learn Spelling, it just adds the word to the ~/Library/Spelling/LocalDictionary file. If you’ve added a word to your dictionary that you no longer want, just open up the file and delete the word.
Relatedly, ⇧⌘G in any Finder window and paste a pathname to go straight to that file or folder. (See the Go to folder… tip.)
Test your network capacity without any third party things (like speedtest.net or fast.com) by running networkQuality from the command line, optionally using the -v flag for verbose outputvery nerdy details.
No, MTV is not shutting down, though Paramount Skydance did shutter some all-music video channels in various markets. But never mind: the internet can best even vintage MTV. Tune into MTV REWIND and hit shuffle by decade.