Skip links

AI Tools catalog

Filters

14 tools found

Social Networks
AI SMM

AI SMM is a platform for automatic management of social media accounts, offering tools for creating content plans, post generation, and scheduling.

Music
Melody ML

Melody ML is a platform that uses machine learning to separate music tracks, allowing users to upload songs and download the separated stems for a cost after the first two free songs, with supported audio formats including MP3, Wav, Flac, and Ogg/Vorbis

Marketing
Collab.com

Collab is a contact center software that enables digital transformation, balances automation and human interaction, and provides enhanced customer experiences through omnichannel solutions, AI, and CRM integration

Coding
Jungle AI

Jungle AI is an AI technology company that applies artificial intelligence to improve the performance of machinery, including renewable energy sources, and offers an AI-powered asset management app called Canopy, which uses historical data to predict component failures and identify poor performance

Websites & Design
uKit AI

uKit AI is an artificial intelligence system that analyzes and upgrades websites based on best practices, fixing typical mistakes, and offering AI-based marketing and design services for a membership fee, with the potential for token-based rewards and benefits

Aggregator
Promptpal

PromptPal.net is a platform that provides a variety of prompts, GPTs, and bots for AI, including GPT-4 and DALL-E.

Music
Rave DJ

RaveDJ is a website that allows users to create mashups of their favorite songs by using artificial intelligence.

Amazing
Chai

Chai is a platform for two-way AI communications, providing a cutting-edge smartphone app and web platform that allows users to chat with AI chatbots, with numerous bots available and a Python library called chaipy for bot programming

Security
Ethiack

ETHIACK is an autonomous ethical hacking platform that provides real-time monitoring, comprehensive testing, and strategic insights to uphold the integrity of digital assets and prioritize actions in the face of intensive cybersecurity risks

Explore
Drag