-
miHoYo
- Shanghai
-
14:39
(UTC +08:00) - https://reito.fun
- https://space.bilibili.com/2305653
Lists (4)
Sort Name ascending (A-Z)
Stars
Sentence Transformers API: An OpenAI compatible embedding API server
A native, user-mode, multi-process, graphical debugger.
A completely private, locally-operated Ai Assistant/Chatbot/Sub-Agent Framework with realistic Long Term Memory and thought formation using Open Source LLMs. Qdrant is used for the Vector DB.
FastAPI Backend for a Conversational Agent using Cohere, (Azure) OpenAI, Langchain & Langgraph and Qdrant as VectorDB
This is a self hosting repository for creating AI Agents and AI Agent powered workflows using n8n, qdrant, ollama, postgres and redis
The best free and open-source automated time tracker. Cross-platform, extensible, privacy-focused.
Pure Go 1000k+ connections solution, support tls/http1.x/websocket and basically compatible with net/http, with high-performance and low memory cost, non-blocking, event-driven, easy-to-use.
laggykiller / sqlcipher3
Forked from coleifer/sqlcipher3Python 3 bindings for SQLCipher
Simple logging module Electron/Node.js/NW.js application. No dependencies. No complicated configuration.
An AI-powered task-management system you can drop into Cursor, Lovable, Windsurf, Roo, and others.
PromptX · 领先的AI上下文工程平台 | PromptX · The Leading AI Context Engineering Platform
A tool for prompting users to approve Screen Recording on macOS
DMattoon / TSS.C
Forked from tpm2-software/tpm2-tssOSS implementation of the TCG TPM2 Software Stack (TSS2)
SPOK (Secure Platform Ops Kit) is a windows library for simplifying TPM interactions such as attestation and key operations
TPM Return Code Decoder: decode error return codes for TPM 1.2 and TPM 2.0
Experiments on device bound credential. Protect credentials and tokens from thefting with HSM (Hardware Security Module, e.g. SecurityEnclave, TEE, TPM).
🔥Unity国际版下载站,可通过直链或者Unity Hub下载例如Unity 6等Unity Editor的国际版,支持添加组件、下载国际版Unity Hub、包含长期支持版、技术支持版、测试版、预览版的Unity。
An explainer to propose how the WebCrypto API can be extended to support Hardware Backed keys
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.