Sponsored Links:

Five years after Abraham Lincoln's assassination, something is again amiss at Ford's Theatre. President Grant plans to attend a play, but he has received a death threat signed "The True Executioner of Abraham Lincoln."You play as Secret Service agents...

read more

You play as the Stranger, a top-notch monster hunter who works for a mysterious agency known only as Spookhouse. Spookhouse is a secret society dedicated to protecting the world from monsters and the supernatural. The Stranger has been assigned to...

read more

It's July 1931. You play as the Stranger, a top-notch monster hunter who works for a mysterious agency known only as Spookhouse. Spookhouse is a secret society dedicated to protecting the world from monsters and the supernatural. Thrown clear from a...

read more

Siege of Avalon is a "traditional" medieval fantasy RPG with real-time combat. The player is a young human male who just arrived on the scene at the culmination of a 12-year war. His skills and specialized capabilities evolve throughout the game as the...

read more
Sponsored Links:

Ubi Soft and Xilam entertainment have teamed up to bring colorful, unusual, and just plain stupid alien invaders. An evil professor, who collects aliens as a hobby, is after five of your stupid alien friends: it's up to you to help them escape. The...

read more

Gathering of Developers proudly unveils a three-game series based on the rich mythology behind the blockbuster film, The Blair Witch Project. Haxan Films has granted unprecedented access to its wealth of intricate folklore, providing the developers with...

read more

Kao the Kangaroo is a third-person 3D arcade-style game featuring an energetic marsupial with over-developed hindquarters and an eye for a fight. Kidnapped by the mischievous Hunter and taken away from his lovely home, it is up to you to help Kao the...

read more
Sponsored Links:

You play an Uplink agent who makes a living by performing jobs for major corporations. Your tasks involve hacking into rival computer systems, stealing research data, sabotaging other companies, laundering money, erasing evidence, or framing innocent...

read more