Sakana AI
SakanaAI
On a quest to create a new kind of foundation model based on nature-inspired intelligence.
Tokyo
Model Context Protocol
modelcontextprotocol
An open protocol that enables seamless integration between LLM applications and external data sources and tools.
GitBook
GitbookIO
Personalized, intelligent docs — tailored to every user, powered by AI.
United States of America
가짜연구소 (Pseudo Lab)
Pseudo-Lab
Non-profit community driving the popularization of machine learning research
CVE Program
CVEProject
The mission of the CVE™ Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.
TON - The Open Network
ton-blockchain
The next gen network to unite all blockchains and the existing Internet
sickcodes
sickcodes
Security Researcher | Freelance Developer | Open Source
I'm on Twitter, Linkedin, Discord, Telegram, Element
Links: http://sick.codes
info@sick.codes
Hacker | Contractor | Security Researcer | Freelance Developer | Open Source Australiasia
Horizon 3 AI Inc
horizon3ai
AI-powered Pen Tests. See your enterprise through the eyes of an attacker & fix what matters.
Iceman
iceman1001
RFID hacking, Proxmark, NFC, EMV | PACS | Magic moon beans | Four spaces instead of Tab |
IceSQL AB
The Nim programming language
nim-lang
Nim is a systems programming language with a focus on efficiency, expressiveness, and elegance.
The I2P Project
i2p
These are mirrors of the official git repositories at i2pgit.org/git.idk.i2p
Goby
gobysec
Goby - Make Cybersecurity More Effective
The new generation of network security technology
Goby Singapore
PreviousNext