Kijai / WanVideo_comfy
Last scanned: Jun 3, 2025 at 10:06 AM UTC
Versions
Version | Commit message | Commit author | Last scanned | ||
---|---|---|---|---|---|
Rename Wan2.1-Fun-InP-14B_fp8_e4m3fn.safetensors to Fun/Wan2.1-Fun-InP-14B_fp8_e4m3fn.safetensors | Kijai | 21 hours ago | |||
Rename Wan2.1-Fun-Control-14B_fp8_e4m3fn.safetensors to Fun/Wan2.1-Fun-Control-14B_fp8_e4m3fn.safetensors | Kijai | 21 hours ago | |||
Upload lightx2v_14B_T2V_cfg_step_distill_lora_adaptive_rank_quantile_0.15_bf16.safetensors | Kijai | Jul 19, 2025 | |||
Upload lightx2v_I2V_14B_480p_cfg_step_distill_rank256_bf16.safetensors | Kijai | Jul 19, 2025 | |||
Upload lightx2v_T2V_14B_cfg_step_distill_v2_lora_rank256_bf16.safetensors | Kijai | Jul 19, 2025 | |||
Upload lightx2v_T2V_14B_cfg_step_distill_v2_lora_rank256_bf16.safetensors | Kijai | Jul 19, 2025 | |||
Upload Wan2_1-Anisora-I2V-480P-14B_Q8_0.gguf | Kijai | Jul 15, 2025 | |||
Upload Wan2_1-Anisora-I2V-480P-14B_fp8_e4m3fn.safetensors | Kijai | Jul 15, 2025 | |||
Update README.md | Kijai | Jul 8, 2025 | |||
Upload WanVideo_2_1_Multitalk_14B_fp8_e4m3fn.safetensors | Kijai | Jun 20, 2025 | |||
Upload Wan2_1-Wan-I2V-MAGREF-14B_fp8_e4m3fn.safetensors | Kijai | Jun 17, 2025 | |||
Update README.md | Kijai | Jun 17, 2025 | |||
Upload Wan2_1-MiniMaxRemover_1_3B_fp16.safetensors | Kijai | Jun 17, 2025 | |||
Update README.md | Kijai | Jun 16, 2025 | |||
Upload Wan21_T2V_14B_lightx2v_cfg_step_distill_lora_rank32.safetensors | Kijai | Jun 16, 2025 | |||
Rename Wan21_I2V_14B_AccVid_lora_rank32.safetensors to Wan21_AccVid_I2V_480P_14B_lora_rank32_fp16.safetensors | Kijai | Jun 3, 2025 | |||
Upload Wan21_I2V_14B_AccVid_lora_rank32.safetensors | Kijai | Jun 3, 2025 | |||
Upload Wan2_1-I2V-ATI-14B_fp16.safetensors | Kijai | Jun 2, 2025 | |||
Update README.md | Kijai | Jun 2, 2025 | |||
Rename Wan2_1-Wan-I2V-ATI-14B_fp8_e5m2.safetensors to Wan2_1-I2V-ATI-14B_fp8_e5m2.safetensors | Kijai | Jun 2, 2025 |
Protect AI's security scanner detects threats in model files
With Protect AI's Guardian you can scan models for threats before ML developers download them for use, and apply policies based on your risk tolerance.
Found a new threat?
Earn bounties and get recognition for your discoveries by submitting them through Huntr.