Showing 15 open source projects for "music-generation"

View related business solutions
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    DeepAudit

    DeepAudit

    AI multi-agent platform for automated code security auditing system

    ...It also includes automated proof-of-concept validation using a sandboxed environment, allowing detected issues to be tested for real exploitability. DeepAudit integrates retrieval-augmented generation techniques to enhance contextual understanding and reduce false positives during analysis. Users can import projects and trigger a full audit workflow that includes risk identification, exploit generation, validation, and final report creation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Posterizarr

    Posterizarr

    Automated poster maker for Plex/Jellyfin/Emby

    Posterizarr is a creative automation tool designed for media server enthusiasts who want to generate attractive posters for their media libraries on platforms like Plex, Jellyfin, or Emby. It’s implemented as a PowerShell-based application with a comprehensive web UI that makes it easy to configure and trigger image generation tasks. Posterizarr fetches artwork from sources such as Fanart.tv, TMDB, TVDB, IMDb, and applies customizable overlays and design rules to produce clean, textless posters tailored to your library’s preferences. It supports integration with tools like Tautulli, Sonarr, and Radarr so that poster generation can be triggered automatically based on media library updates or other events. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    douyin

    douyin

    Open source Douyin crawler for collecting and downloading public data

    ...It demonstrates how to build a Python-based web crawler combined with a graphical interface and command line functionality. It allows users to collect data from various types of Douyin content, including user profiles, videos, hashtags, and music pages. DouyinCrawler supports both automated scraping and batch operations to process multiple targets efficiently. It also integrates with the Aria2 download utility to enable large-scale downloading of videos and images associated with collected content. It includes multiple usage modes such as a desktop GUI, a web service interface, and a command line tool for flexible deployment. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Testimo

    Testimo

    Testimo is a PowerShell module for running health checks for AD

    Testimo is a PowerShell-based test automation framework that simplifies writing, running, and reporting tests for infrastructure and script libraries. It provides constructs to define test cases, assertions, setup/teardown sequences, and grouping so validation logic is clear and maintainable. Designed for operations and platform engineers, Testimo focuses on verifying infrastructure state (configuration settings, service availability, registry keys) rather than purely unit-level code, making...
    Downloads: 14 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5
    Generative AI for Beginners .NET

    Generative AI for Beginners .NET

    Hands-on .NET course for building real-world generative AI apps

    Generative AI for Beginners .NET is a hands-on course that helps developers build real-world AI applications using the .NET ecosystem. It walks through core concepts such as text generation, chat-based interactions, and integrating large language models into applications. Each lesson includes short videos, working code samples, and step-by-step instructions, making it easy to follow and apply immediately. Generative AI for Beginners .NET supports tools like GitHub Models, Azure OpenAI Service, and local models, giving flexibility in how projects are built and tested. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    windsurf.vim

    windsurf.vim

    Free, ultrafast Copilot alternative for Vim and Neovim

    windsurf.vim is a plugin for Vim and Neovim by Exafunction (formerly part of the Codeium project) that brings in AI-driven code completion and assistance capabilities. The aim is to provide a “free, ultrafast” alternative to other AI code assistants (such as GitHub Copilot) directly within Vim/Neovim. Once installed and configured, windsurf.vim can suggest code completions, generate multi-line snippets based on comments or invitation in code, and make the editing experience more predictive...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    Scoop (un)installer

    Scoop (un)installer

    Next-generation Scoop (un)installer

    Scoop (un)installer is the official installer and uninstaller script system for Scoop, designed to make Scoop setup reliable, configurable, and repeatable across different Windows environments. Instead of being “just a one-liner,” it supports a full parameterized workflow where you can choose custom install directories, set global app locations, and control how networking is handled during installation. It is meant to run from PowerShell with appropriate execution policy and language mode,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    MemProcFS Analyzer

    MemProcFS Analyzer

    Automated Forensic Analysis of Windows Memory Dumps for DFIR

    MemProcFS-Analyzer is a forensic analysis toolset that builds on the MemProcFS virtual filesystem to make volatile memory artefacts easier to browse and interpret. By exposing process memory, kernel objects, and derived artifacts as regular files, the framework lets analysts use familiar filesystem operations and standard tools (editors, grep, diff) to explore memory snapshots. The Analyzer layer adds higher-level parsing and extraction routines—for example, carving strings, locating...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    Agent Framework

    Agent Framework

    Framework for building, orchestrating, and deploying AI agents

    ...It also includes components such as agent sessions for managing state, context providers for maintaining memory, and middleware for intercepting and extending agent behavior. Developers can integrate external tools and services so that agents can execute actions beyond text generation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 10
    transmission_cleanup

    transmission_cleanup

    Clean up of torrent files using the RPC protocal

    This application connects to the tranmission web client using the RPC interface, it allows the user to set the inital download folder for the torrents for sorting into their own folders based on the type of file it is. it also allows scheduling of the cleaning process eithe daily or weekly at a time set by you in the install process. you supply your username and password for the RPC web interface whohc is encrypted by the application and saved to the disk, The application checks if the torrent is completed, finished seeding and the sorts the files in to correct folder e.g a video into the media folder, MP3 on music folder etc. On windows there is a full shortcuts to reset the RPC credentails, run a manual cleanup, uninstall and also view log file. Application for both macOS and windows have undergone extensive testing before being released.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Sysmon-Modular

    Sysmon-Modular

    A repository of sysmon configuration modules

    ...The repo ships helper tooling (PowerShell and Python scripts) to merge selected modules into a final sysmonconfig.xml, automating CI builds and allowing repeatable config generation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    BadBlood

    BadBlood

    Flls Microsoft Active Directory Domain with a structure

    BadBlood is a PowerShell toolkit that programmatically populates a Microsoft Active Directory domain with a realistic, large-scale structure of OUs, users, groups, computers, and permissions so defenders and testers can practice discovery, hardening, and incident response on a lifelike environment. It intentionally randomizes its output on every run so the created domain, objects, and ACL relationships are different each time, which helps teams exercise tooling and detection logic against...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    vulnerable-AD

    vulnerable-AD

    Create a vulnerable active directory

    Vulnerable-AD is a PowerShell toolkit that automates the creation of a deliberately insecure Active Directory domain for hands-on labs and testing. It builds a domain controller (or augments an existing AD installation) with a variety of common misconfigurations and intentional weaknesses so practitioners can exercise attack techniques such as Kerberoast, AS-REP roast, DCSync, Pass-the-Hash, Silver/Golden Ticket attacks, and more. The project can create user objects with default or weak...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. Responsible use centers on authorized assessments: defenders use the toolkit to validate monitoring and detection, while operators apply its lessons to patch, harden, and instrument systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB