Skip links

AI Tools catalog

Filters

15 tools found

Transcription
Podsqueeze

Podsqueeze is a platform that offers an affiliate program and a community for podcasters to connect, learn, and grow together.

Image
Ximilar

Ximilar is a computer vision platform that enables the development of AI-powered systems for image recognition, visual quality control, and more without knowledge of coding or machine learning, and once the model is trained, it is deployed as a REST API endpoint.

Media & Entertainment
Brandbird

BrandBird is a powerful image, mockup, and screenshot editor designed for entrepreneurs, founders, marketers, and creators, offering easy-to-use presets, customizable graphics, and a collection of templates for social media and other visual content creation.

Chatbots
BotX

BotX is a no-code AI platform that automates workflows and builds products using private or public large language models, saving time and money by providing cutting-edge low-code AI solutions

Games
Framedrop

Framedrop.gg is a free AI-powered tool that helps streamers discover and edit their best plays in seconds, allowing them to effortlessly enhance and share their top plays on social media platforms.

Transcription
Noty AI

Noty.ai is an AI-powered workplace assistant designed to streamline communication, improve productivity, and enhance collaboration across various professional fields, including UX/UI research, sales, product management, HR, and recruitment

Chatbots
SilFer Bots

SilFer Bots is a platform for creating Facebook Messenger bots for sales, marketing, and customer support, offering integration with various other business tools and services.

Voice Reading
FreeTTS

FreeTTS is a website that offers online text-to-speech conversion to generate spoken audio in various formats and supports interpreting units, verbatim, and dates.

Security
Ethiack

ETHIACK is an autonomous ethical hacking platform that provides real-time monitoring, comprehensive testing, and strategic insights to uphold the integrity of digital assets and prioritize actions in the face of intensive cybersecurity risks

Explore
Drag