Skip links

AI Tools catalog

Filters

29 tools found

Image
Remove BG

Remove.bg is a website that uses AI to remove the background from images, allowing users to make backgrounds transparent, add a white background, extract the subject, or get the cutout of a photo.

Storytelling Generator
Oscar

Oscar Stories is an app that generates personalized bedtime stories for children, featuring them as the main characters and embedding important life lessons into the stories.

Fashion
designovel.com

Designovel is an AI tool that focuses on fashion trend forecasting and design recommendation, offering solutions such as trend analysis, market sensing, and product/service planning, with a focus on making advanced technology easily accessible and understandable

Transcription
Podsqueeze

Podsqueeze is a platform that offers an affiliate program and a community for podcasters to connect, learn, and grow together.

Presentations
Pitch Avatar

Pitch Avatar is an AI-powered platform that generates personalized content, simplifies presentation delivery, and engages listeners, making it an ideal tool for virtual salespeople, marketers, recruiters, and investors.

Audio
Auphonic

Auphonic is an all-in-one audio post-production web tool that allows users to achieve professional quality results, with features such as automatic speech recognition, shownotes, and chapters, and can be used for free for up to 2 hours of audio each month.

3D model
Plask AI

Plask.ai offers Plask Motion, an AI-powered animation toolkit for video, gaming, film, and virtual reality, enabling seamless and efficient motion capture and animation creation.

Business
Jusi

Jusi is an AI technical specification generator created by Konstantin Doronin, allowing the creation of technical specifications for apps or websites and the identification of suitable performers using AI

Security
Ethiack

ETHIACK is an autonomous ethical hacking platform that provides real-time monitoring, comprehensive testing, and strategic insights to uphold the integrity of digital assets and prioritize actions in the face of intensive cybersecurity risks

Explore
Drag