Browse free open source C++ Generative AI and projects below. Use the toggles on the left to filter open source C++ Generative AI by OS, license, language, programming language, and project status.

  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • High-performance Open Source API Gateway Icon
    High-performance Open Source API Gateway

    KrakenD is a stateless, distributed, high-performance API Gateway that helps you effortlessly adopt microservices

    KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance.
  • 1
    llama.cpp

    llama.cpp

    Port of Facebook's LLaMA model in C/C++

    Inference of LLaMA model in pure C/C++
    Downloads: 28 This Week
    Last Update:
    See Project
  • 2
    GnoppixNG

    GnoppixNG

    Gnoppix Linux

    Gnoppix is a Linux distribution based on Debian, available in for amd64 ,i386 and ARM architectures. Gnoppix is a great choice for users who want a lightweight and easy-to-use with security in mind. Gnoppix was first announced in June 2003. Currently we're working on a Gnoppix version for WSL, Mobile devices like smartphones and tablets as well.
    Leader badge
    Downloads: 159 This Week
    Last Update:
    See Project
  • 3
    Alpaca.cpp

    Alpaca.cpp

    Locally run an Instruction-Tuned Chat-Style LLM

    Run a fast ChatGPT-like model locally on your device. This combines the LLaMA foundation model with an open reproduction of Stanford Alpaca a fine-tuning of the base model to obey instructions (akin to the RLHF used to train ChatGPT) and a set of modifications to llama.cpp to add a chat interface. Download the zip file corresponding to your operating system from the latest release. The weights are based on the published fine-tunes from alpaca-lora, converted back into a PyTorch checkpoint with a modified script and then quantized with llama.cpp the regular way.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    pytorch-cpp

    pytorch-cpp

    C++ Implementation of PyTorch Tutorials for Everyone

    C++ Implementation of PyTorch Tutorials for Everyone. This repository provides tutorial code in C++ for deep learning researchers to learn PyTorch (i.e. Section 1 to 3) Interactive Tutorials are currently running on LibTorch Nightly Version. Libtorch only supports 64bit Windows and an x64 generator needs to be specified. Create all required script module files for pre-learned models/weights during the build. Requires installed python3 with PyTorch and torch-vision. You can choose to only build tutorials in one of the categories basics, intermediate, advanced or popular. You can build and run the tutorials (on CPU) in a Docker container using the provided Dockerfile and docker-compose.yml files.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Easy management of simple and complex projects Icon
    Easy management of simple and complex projects

    We help different businesses become digital, manage projects, teams, communicate effectively and control tasks online.

    Plan more projects with Worksection. Use Gantt chart and Kanban boards to organize your projects, get your team onboard and assign tasks and due dates.
  • 5
    Critterding2

    Critterding2

    Evolving Artificial Life

    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DomE

    DomE

    Implements a reference architecture for creating information systems

    DomE Experiment is an implementation of a reference architecture for creating information systems from the automated evolution of the domain model. The architecture comprises elements that guarantee user access through automatically generated interfaces for various devices, integration with external information sources, data and operations security, automatic generation of analytical information, and automatic control of business processes. All these features are generated from the domain model, which is, in turn, continuously evolved from interactions with the user or autonomously by the system itself. Thus, an alternative to the traditional software production processes is proposed, which involves several stages and different actors, sometimes demanding a lot of time and money without obtaining the expected result. With software engineering techniques, self-adaptive systems, and artificial intelligence, it is possible, the integration between design time and execution time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Hook-Botnet-hookbotnet-malware

    Hook-Botnet-hookbotnet-malware

    Hook Botnet is a sophisticated malware.

    http://t.me/ALIENDOT It is known for its capabilities as a trojan horse virus generator, allowing attackers to remotely access and control compromised devices. This botnet can perform a variety of malicious activities, including managing the screen, recording calls, overseeing messages, and accessing sensitive information such as contacts and cryptocurrency wallet seed phrases. #trojan #cybersecurity Key Features #hookbotnet #features Remote Access: Hook Botnet enables attackers to remotely engage with the display of infected devices, which allows for extensive surveillance and control. #RemoteAccess Ghost Mode: One of its standout features is the ability to operate in a "ghost mode," making it difficult for users to detect that their device has been compromised. #GhostMode Real-Time Updates: The botnet remains under the control of the attacker, allowing for real-time updates and modifications to the malware's behavior, which can be exploited for financial gain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next