Stars
Learn how to design large-scale systems. Prep for the system design interview. Includes Anki flashcards.
Stable Diffusion web UI
🦜🔗 The platform for reliable agents.
User-friendly AI Interface (Supports Ollama, OpenAI API, ...)
A high-throughput and memory-efficient inference and serving engine for LLMs
A natural language interface for computers
LlamaIndex is the leading framework for building LLM-powered agents over your data.
Streamlit — A faster way to build and share data apps.
Collection of Summer 2026 tech internships!
Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more
🤗 Diffusers: State-of-the-art diffusion models for image, video, and audio generation in PyTorch.
OCRmyPDF adds an OCR text layer to scanned PDF files, allowing them to be searched
You like pytorch? You like micrograd? You love tinygrad! ❤️
The official Python library for the OpenAI API
Official inference repo for FLUX.1 models
The ChatGPT Retrieval Plugin lets you easily find personal or work documents by asking questions in natural language.
Original reference implementation of "3D Gaussian Splatting for Real-Time Radiance Field Rendering"
WhisperX: Automatic Speech Recognition with Word-level Timestamps (& Diarization)
pix2tex: Using a ViT to convert images of equations into LaTeX code.
RWKV (pronounced RwaKuv) is an RNN with great LLM performance, which can also be directly trained like a GPT transformer (parallelizable). We are at RWKV-7 "Goose". So it's combining the best of RN…
💡 All-in-one AI framework for semantic search, LLM orchestration and language model workflows
An API standard for single-agent reinforcement learning environments, with popular reference environments and related utilities (formerly Gym)
Access large language models from the command-line
Fast subdomains enumeration tool for penetration testers
File Parser optimised for LLM Ingestion with no loss 🧠 Parse PDFs, Docx, PPTx in a format that is ideal for LLMs.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data