Kijai / WanVideo_comfy
Last scanned: Jul 15, 2025 at 8:10 AM UTC
Versions
Version | Commit message | Commit author | Last scanned | ||
---|---|---|---|---|---|
Upload Wan2_1_EchoShot_1_3B_lora_rank_128_fp16.safetensors | Kijai | Never scanned | |||
Upload 2 files | Kijai | Never scanned | |||
Rename Wan2_1-Fun-V1_1-14B-Control_fp8_e4m3fn.safetensors to Fun/Wan2_1-Fun-V1_1-14B-Control_fp8_e4m3fn.safetensors | Kijai | Never scanned | |||
Rename Wan2_1-Wan2_1-Fun-V1_1-14B-Control-Camera_fp8_e4m3fn.safetensors to Fun/Wan2_1-Fun-V1_1-14B-Control-Camera_fp8_e4m3fn.safetensors | Kijai | Never scanned | |||
Rename Wan2.1-Fun-InP-14B_fp8_e5m2.safetensors to Fun/Wan2.1-Fun-InP-14B_fp8_e5m2.safetensors | Kijai | Never scanned | |||
Rename Wan2.1-Fun-InP-14B_fp8_e4m3fn.safetensors to Fun/Wan2.1-Fun-InP-14B_fp8_e4m3fn.safetensors | Kijai | 3 days ago | |||
Rename Wan2.1-Fun-Control-14B_fp8_e5m2.safetensors to Fun/Wan2.1-Fun-Control-14B_fp8_e5m2.safetensors | Kijai | Never scanned | |||
Rename Wan2.1-Fun-Control-14B_fp8_e4m3fn.safetensors to Fun/Wan2.1-Fun-Control-14B_fp8_e4m3fn.safetensors | Kijai | 3 days ago | |||
Update README.md | Kijai | Never scanned | |||
Upload Wan2_1-T2V-1-3B-EchoShot_fp16.safetensors | Kijai | Never scanned | |||
Update README.md | Kijai | Never scanned | |||
Upload 2 files | Kijai | 2 days ago | |||
Upload FastWan_T2V_14B_480p_lora_rank_64_bf16.safetensors | Kijai | Never scanned | |||
Upload Wan2_1-T2V_FastWan_1_3B_bf16.safetensors | Kijai | 2 days ago | |||
Update README.md | Kijai | 2 days ago | |||
Delete fp8_scaled_kj | Kijai | Never scanned | |||
Create README.md | Kijai | Never scanned | |||
Upload Wan2_1-T2V-14B_fp8_e4m3fn_scaled_KJ.safetensors | Kijai | Never scanned | |||
Upload lightx2v_14B_T2V_cfg_step_distill_lora_adaptive_rank_quantile_0.15_bf16.safetensors | Kijai | Jul 19, 2025 | |||
Upload lightx2v_I2V_14B_480p_cfg_step_distill_rank256_bf16.safetensors | Kijai | Jul 19, 2025 |
Protect AI's security scanner detects threats in model files
With Protect AI's Guardian you can scan models for threats before ML developers download them for use, and apply policies based on your risk tolerance.
Found a new threat?
Earn bounties and get recognition for your discoveries by submitting them through Huntr.