- Palestine
-
09:32
(UTC -12:00) - https://momenalbelbeisi.substack.com/
- @2022_crazy
- in/moman-abde-b8351a116
Starred repositories
A list of free LLM inference resources accessible via API.
Simple but Powerful web-based Control Panel
Store your translations in the database or other sources
The 500 AI Agents Projects is a curated collection of AI agent use cases across various industries. It showcases practical applications and provides links to open-source projects for implementation…
The Self-hosted AI Starter Kit is an open-source template that quickly sets up a local AI environment. Curated by n8n, it provides essential tools for creating secure, self-hosted AI workflows.
Core PHP implementation for the Model Context Protocol (MCP) server
Learn Agentic AI using Dapr Agentic Cloud Ascent (DACA) Design Pattern and Agent-Native Cloud Technologies: OpenAI Agents SDK, Memory, MCP, A2A, Knowledge Graphs, Dapr, Rancher Desktop, and Kuberne…
Kortix – build, manage and train AI Agents.
A unified interface for working with LLMs in Laravel
Free and open source laravel eCommerce platform
Collection of awesome LLM apps with AI Agents and RAG using OpenAI, Anthropic, Gemini and opensource models.
No fortress, purely open ground. OpenManus is Coming.
Jan is an open source alternative to ChatGPT that runs 100% offline on your computer.
A personal finance tracker app built with love, and Flutter
Demo Vue Form Builder Usage with Laravel
A collection of PDF/books about the modern web application security and bug bounty.
Fast, minimal blog with dark mode support.
All about bug bounty (bypasses, payloads, and etc)
This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter
A tool for adding new lines to files, skipping duplicates
This Repositories contains list of One Liners with Descriptions and Installation requirements
A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for identifying and exploiting vulnerabilities.