Highlights
- Pro
Stars
๏ฃฟ Now we have become very big, Different from the original idea. Collect premium software in various categories.
Independent technology for modern publishing, memberships, subscriptions and newsletters.
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
The all-in-one Desktop & Docker AI application with built-in RAG, AI agents, and more.
State-of-the-art Machine Learning for the web. Run ๐ค Transformers directly in your browser, with no need for a server!
The all-in-one tool to supercharge your productivity โจ๏ธ
The open source Zapier alternative. Build workflow automation without spending time and money.
Violentmonkey provides userscripts support for browsers. It works on browsers with WebExtensions support.
Lightning fast code searching made easy
โ๏ธ Easily test HTTP webhooks with this handy tool that displays requests instantly.
timvisee / send
Forked from mozilla/send๐ฌ Simple, private file sharing. Mirror of https://gitlab.com/timvisee/send
Whisper as a Service (GUI and API with queuing for OpenAI Whisper)
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
Calculate token/s & GPU memory requirement for any LLM. Supports llama.cpp/ggml/bnb/QLoRA quantization
Discover the location of nearby Telegram users ๐ก๐
A simple application for multi-factor authentication, written in HTML using jQuery Mobile, jsSHA and LocalStorage.
CIPP is a M365 multitenant management solution
Supercharge Notion with custom commands to record, draw, and more โ๏ธ
PlantUML sprites, macros, and other includes for Azure services
Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error
Clipboard Conqueror is a novel copy and paste copilot alternative designed to bring your very own LLM AI assistant to any text field.
CA Optics - Azure AD Conditional Access Gap Analyzer
A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you come from where did you go) in Security Incidents and Threat Hunts