Skip links

AI Tools catalog

Filters

16 tools found

Image
Ximilar

Ximilar is a computer vision platform that enables the development of AI-powered systems for image recognition, visual quality control, and more without knowledge of coding or machine learning, and once the model is trained, it is deployed as a REST API endpoint.

Avatars
PhotoAI

PhotoAI is an innovative AI platform that uses advanced algorithms to generate unique and personalized AI photos, offering a variety of packs for different use cases such as Tinder profiles, LinkedIn headshots, or fantasy-style visuals, with a focus on security and privacy

Transcription
Noty AI

Noty.ai is an AI-powered workplace assistant designed to streamline communication, improve productivity, and enhance collaboration across various professional fields, including UX/UI research, sales, product management, HR, and recruitment

Transcription
Podsqueeze

Podsqueeze is a platform that offers an affiliate program and a community for podcasters to connect, learn, and grow together.

Marketing
Collab.com

Collab is a contact center software that enables digital transformation, balances automation and human interaction, and provides enhanced customer experiences through omnichannel solutions, AI, and CRM integration

Website Builders
Octopus.do

Octopus.do is a free visual sitemap generator that uses artificial intelligence to create the visual structure of a website, which serves as an important starting point for further development.

Excel
Ajelix

Ajelix is a platform that offers a variety of AI Excel tools and data visualization solutions, including an AI Excel formula generator, a data visualization tool called Ajelix BI, and more than 20 AI tools for spreadsheets.

Aggregator
Promptpal

PromptPal.net is a platform that provides a variety of prompts, GPTs, and bots for AI, including GPT-4 and DALL-E.

Security
Ethiack

ETHIACK is an autonomous ethical hacking platform that provides real-time monitoring, comprehensive testing, and strategic insights to uphold the integrity of digital assets and prioritize actions in the face of intensive cybersecurity risks

Explore
Drag