Browse applications built on security technology. Explore PoC and MVP applications created by our community and discover innovative use cases for security technology.
SureRAG is revolutionizing the way businesses manage their online reputation through cutting-edge AI technology. Our platform ensures your public-facing content is not only engaging but also accurate and trustworthy.
Enable the unmasking of cyber threats — AI augmentation meets the MITRE ATT&CK Framework. AiTTRIBUTOR turns indicators into foresight and adversaries into open books.
an AI specialized in security, information and care for the elderly's relationship with technology
Term and Conditions web app summarizer using GoogleVertexAI models and TruLens for evaluation
An interactive AI assistant specialized in Ghanaian tax law, providing clarity and guidance for compliance.
A web app with Google Vertex AI LLM based model aimed to summarize and let the user be aware of the terms and conditions of the companies he signed up for, this app aligns with Sustainable Development Goals 16: Peace, Justice and Strong Institutions
Neurolitiks revolutionizes urban policy-making with advanced AI, including RAG and Cohere. It transforms data into actionable insights, targeting key sectors in a $100M market, and equips leaders for transformative decisions.
DefendIQ: Enhancing Security with Custom AI Models and IoT Integration for Swift Anomaly Detection and Response
Introducing a comprehensive solution to combat spam calls and unwanted numbers. By redirecting all unknown calls to an AI bot, suspicious behavior can be detected in real-time using AI.
Introducing an advanced code review tool tailored for pull requests. It seamlessly auto-generates executive summaries in comments, provides in-depth reports hosted on our platform, and facilitates interactive Q&A sessions with a code review chatbot.
We are focusing on surveillance of live video streams, such as CCTV, via YOLOv8 object detection and text-to-speech models. Our goal is to detect various objects in real-time thus utilizing AI for ensuring safety and security in society.
ML based gesture censorship using hand recognition and classification to blur obscene gestures
Using Google Vertex, CVEs, and SBoMs to find vulnerabilities in software
IntelliAudit evaluates the code of smart contract repositories on vulnerabilities leveraging chatcode-bison.
Utilizing AutoGPT and LangChain, we use linux based network security tools for malware and intrusion prevention. AI to keep your network secure and up-to-date.
Our application encrypts speech input messages using OpenAI Whisper and multi-layer encryption codes generated by GPT3. Customizable encryption algorithms and keys, user-friendly interface, and easy code retrieval make it ideal for secure messaging.
Sherlock's Pheonix is a Deep tech solution leveraging Generative AI models plus computer vision plus internet to find your loved ones/missing persons.
An artificial intelligence podcast that is written by ChatGPT, GPT-3.5, Open-AI davinci, and human assistance. The art is generated by Stable Diffusion, Open Journey, and Dall-E 2. It is read by Natural Readers text-to-speech and Lifelike Speech Synthesis