LLM based autonomous agent that does online comprehensive research on any given topic
☆14Sep 27, 2024Updated last year
Alternatives and similar repositories for gpt-researcher
Users that are interested in gpt-researcher are comparing it to the libraries listed below
Sorting:
- The magic number 0x5F3759DF in Python3 Fast Inverse SquareRoot☆12Mar 5, 2023Updated 3 years ago
- Network Traffic Fuzzer☆17Dec 28, 2024Updated last year
- ESP8266 Captive Portal with Google login page☆23Nov 28, 2023Updated 2 years ago
- ☆18Jul 29, 2023Updated 2 years ago
- A tool based on libnfc that executes an active authentication and encrypted communication with a CryptoRF tag☆22Sep 1, 2020Updated 5 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- An online exhibition of pretty software bugs. Open for your submissions!☆29Mar 20, 2025Updated 11 months ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆16Jan 7, 2022Updated 4 years ago
- Paste a URL, get a design system. AI-ready style guides for Cursor & Lovable.☆27Dec 20, 2025Updated 2 months ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Example project with Ply autotests☆10Nov 23, 2024Updated last year
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Automatically exported from code.google.com/p/java-card-desfire-emulation☆16Jan 11, 2016Updated 10 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- A network attack using Evil Twin Framework paired in NodeMCU ESP8266 device to exploit vulnerabilities in WiFi with low cost☆14Jul 25, 2023Updated 2 years ago
- Premium React Native App Template with Argon Design☆10Sep 17, 2024Updated last year
- A small tool to block Windows shutdown☆15Oct 6, 2022Updated 3 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Simple demo ilustrating the use of LSTM neural network to predict daily changes in the Ethereum cryptocurrency☆10Jan 23, 2018Updated 8 years ago
- Dumps from a collection of hotel room keys for analysis☆13Oct 19, 2020Updated 5 years ago
- Man-in-the-middle device for attacking RFID access control systems☆16Feb 7, 2023Updated 3 years ago
- Offline tool for recovering NEM private keys from BIP39 mnemonics and importing them into NanoWallet☆13Jan 15, 2018Updated 8 years ago
- Build Amazon Simple Queue Service (SQS) based applications without the boilerplate☆13Feb 5, 2026Updated last month
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- implementation of OEIS sequences☆11Nov 30, 2016Updated 9 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Play online chess with your friends, powered by Firebase 🔥♟☆11May 29, 2021Updated 4 years ago
- Command line interface client to RFQuack dongles☆10Sep 23, 2022Updated 3 years ago
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- MiniMax Search is an MCP (Model Context Protocol) server that provides web search and browsing capabilities.☆30Nov 3, 2025Updated 4 months ago
- ☆11Feb 15, 2023Updated 3 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- Inspired by people being dumb☆10Jan 2, 2017Updated 9 years ago
- iOS App for face tracking and replacing face in camera/movie.☆10Jan 14, 2020Updated 6 years ago