Kijai / HunyuanVideo_comfy
Last scanned: Never Scanned
Versions
Version | Commit message | Commit author | Last scanned | ||
---|---|---|---|---|---|
Upload hunyuan_video_custom_720p_fp8_scaled.safetensors | Kijai | May 12, 2025 | |||
Upload hunyuan_video_accvid_5_steps_lora_rank16_fp8_e4m3fn.safetensors | Kijai | Mar 31, 2025 | |||
Upload 3 files | Kijai | Mar 31, 2025 | |||
Rename accvideo-t2v-5-steps_fp8_e4m3fn.safetensors to hunyuan_video_accvid-t2v-5-steps_fp8_e4m3fn.safetensors | Kijai | Mar 31, 2025 | |||
Rename accvid_t2v-5-steps_Q4_K_S.gguf to hunyuan_video_accvid_t2v-5-steps_Q4_K_S.gguf | Kijai | Mar 31, 2025 | |||
Upload accvid_t2v-5-steps_Q4_K_S.gguf | Kijai | Mar 31, 2025 | |||
Upload hyvid_dashtoon_keyframe_native_example_01.json | Kijai | Mar 21, 2025 | |||
Upload HunyuanVideo_dashtoon_keyframe_lora_converted_comfy_bf16.safetensors | Kijai | Mar 11, 2025 | |||
Upload HunyuanVideo_dashtoon_keyframe_lora_converted_bf16.safetensors | Kijai | Mar 8, 2025 | |||
Upload hunyuan_video_I2V_720_fixed_bf16.safetensors | Kijai | Mar 7, 2025 | |||
Upload hunyuan_video_I2V_720_fixed_fp8_e4m3fn.safetensors | Kijai | Mar 7, 2025 | |||
Upload HunyuanI2V_basic_native_workflow_example.json | Kijai | Mar 7, 2025 | |||
Rename hyvid_I2V_lora_hair_growth_converted.safetensors to hyvid_I2V_lora_hair_growth.safetensors | Kijai | Mar 6, 2025 | |||
Upload hyvid_I2V_lora_embrace.safetensors | Kijai | Mar 6, 2025 | |||
Rename hyvid_I2V_hair_growth_converted.safetensors to hyvid_I2V_lora_hair_growth_converted.safetensors | Kijai | Mar 6, 2025 | |||
Upload hyvid_I2V_hair_growth_converted.safetensors | Kijai | Mar 6, 2025 | |||
Update README.md | Kijai | Mar 6, 2025 | |||
Upload HunyuanI2V_basic_native_workflow_example.json | Kijai | Mar 6, 2025 | |||
Upload HunyuanI2V_basic_native_workflow_example.json | Kijai | Mar 6, 2025 | |||
Upload hyvideo_FastVideo_LoRA-fp8.safetensors | Kijai | Dec 17, 2024 |
Protect AI's security scanner detects threats in model files
With Protect AI's Guardian you can scan models for threats before ML developers download them for use, and apply policies based on your risk tolerance.
Found a new threat?
Earn bounties and get recognition for your discoveries by submitting them through Huntr.