🛠️ All DevTools
Showing 41–60 of 2531 tools
Last Updated
November 30, 2025 at 08:00 PM
Show HN: WeatherOrNot a maximal weather app in the terminal
Show HN (score: 5)[CLI Tool] Show HN: WeatherOrNot a maximal weather app in the terminal A RETRO TERMINAL WEATHER EXPERIENCE
Build desktop applications using Go and Web Technologies
Hacker News (score: 21)[Other] Build desktop applications using Go and Web Technologies
Show HN: Stun LLMs with thousands of invisible Unicode characters
Hacker News (score: 119)[Other] Show HN: Stun LLMs with thousands of invisible Unicode characters I made a free tool that stuns LLMs with invisible Unicode characters.<p>*Use cases:* Anti-plagiarism, text obfuscation against LLM scrapers, or just for fun!<p>Even just one word's worth of “gibberified” text is enough to block most LLMs from responding coherently.
A ncurses-based command line torrent client for high performance
Hacker News (score: 13)[CLI Tool] A ncurses-based command line torrent client for high performance
Show HN: I wrote a minimal memory allocator in C
Hacker News (score: 11)[Code Quality] Show HN: I wrote a minimal memory allocator in C A fun toy memory allocator (not thread safe, that's a future TODO). I also wanted to explain how I approached it, so I also wrote a tutorial blog post (~20 minute read) covering the code which you can find the link to in the README.
Show HN: Safe-NPM – only install packages that are +90 days old
Hacker News (score: 35)[Package Manager] Show HN: Safe-NPM – only install packages that are +90 days old This past quarter has been awash with sophisticated npm supply chain attacks like [Shai-Hulud](<a href="https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem" rel="nofollow">https://www.cisa.gov/news-events/alerts/2025/09/23/widesprea...</a>() and the [Chalk/debug Compromise](<a href="https://www.wiz.io/blog/widespread-npm-supply-chain-attack-breaking-down-impact-scope-across-debug-chalk" rel="nofollow">https://www.wiz.io/blog/widespread-npm-supply-chain-attack-b...</a>). This CLI helps protect users from recently compromised packages by only downloading packages that have been public for a while (default is 90 days or older).<p>Install: npm install -g @dendronhq/safe-npm Usage: safe-npm install react@^18 lodash<p>How it works: - Queries npm registry for all versions matching your semver range - Filters out anything published in the last 90 days - Installs the newest "aged" version<p>Limitations: - Won't protect against packages malicious from day one - Doesn't control transitive dependencies (yet - looking into overrides) - Delays access to legitimate new features<p>This is meant as a 80/20 measure against recently compromised NPM packages and is not a silver bullet. Please give it a try and let me know if you have feedback.
Show HN: I just fixed .env once and for all – better-env
Show HN (score: 6)[Other] Show HN: I just fixed .env once and for all – better-env .env files have always felt archaic, insecure, clunky and honestly just not fun to work with. I see my friends (and myself) accidentally committing them all the time. Managing secrets across projects becomes a mess of copy-pasting keys into scattered env files with no real way to sync anything.<p>So I built better-env: a secure, developer-friendly alternative to .env.<p>Store your secrets once in a global encrypted store, and load them per-project at runtime.<p>I’d love feedback on whether this feels useful beyond solo devs, and what you’d want for teams or CI setups.<p>Fully open source: <a href="https://github.com/HarishChandran3304/better-env" rel="nofollow">https://github.com/HarishChandran3304/better-env</a>
[Other] Show HN: Built a tool solve the nightmare of chunking tables in PDF vs. Markdown Hey HN, solo dev here. After years of frustration with how LLMs handle complex documents, especially PDFs with tables, I decided to build a solution myself. My approach uses a Markdown conversion step to preserve the table structure, which seems to work surprisingly well for chunking. This little parser is the first public piece of a much larger, privacy-focused AI platform I'm building. I'm pretty much running on fumes financially, so any feedback, critique, or support is massively appreciated. Happy to answer any questions about the approach!
Show HN: An OKLCH-based perceptually uniform color system/theme builder
Show HN (score: 5)[Other] Show HN: An OKLCH-based perceptually uniform color system/theme builder I've been using a version of this internally for a few months but decided to polish it a little to finally deploy it.<p>It's a color system generator that creates accessible, perceptually uniform color palettes using the OKLCH space. It takes one seed (primary) color, generates relative key colors from multiple color harmony schemes (analogous, complementary, etc) that are then used to create 26-step color ramps each. Shades from the ramps are then used to generate semantic color roles, or can be used for creating custom palettes.<p>All colors are gamut-mapped to the sRGB gamut with chroma reduction, essentially preserving lightness and hue values while finding the maximum in-gamut chroma for each step.<p>There are obvious similarities to Material Design Themes, mostly because I'm visually pretty comfortable with it. Plus, I started this project back when some of the colors generated by Material could be a little dull and I wanted to learn/build something like this from the ground up.<p>There are a couple of improvements I would like to make to this in the near future. The first one is a dynamic chroma curve (the chroma falloffs for the ramps are on a bell curve). At the moment, the chroma curve peaks at L ~0.55 for all hue ranges, which works good enough but isn't ideal for a few reasons. The second one would be adding seed color extraction from images. And maybe a built-in contrast checker.<p>If you find the tool helpful and/or have any feedback or suggestions, let me know.
Editing Code in Emacs
Hacker News (score: 70)[IDE/Editor] Editing Code in Emacs
Tosijs-schema is a super lightweight schema-first LLM-native JSON schema library
Hacker News (score: 24)[Other] Tosijs-schema is a super lightweight schema-first LLM-native JSON schema library
better-env
Product Hunt[CLI Tool] A Secure, Developer-Friendly Alternative to .env better-env is a CLI tool that manages environment variables securely using OpenPGP encryption. Store secrets once in a global encrypted store, link them to projects via commit-safebetter-env files, and load them at runtime, no plaintext to be found anywhere.
Guardon — Shift Kubernetes Security Left
Product Hunt[DevOps] Catch K8s Mistakes Before CI Guardon is different because it brings Kubernetes YAML validation directly into the browser—fully local, instant, and privacy-first. Unlike existing scanners that run in CI/CD or require cloud backends, Guardon validates multi-doc YAMLs in real time, imports Kyverno rules for org-specific guardrails, fetches configs from GitHub, and provides immediate, actionable fixes. It shifts Kubernetes security and compliance truly left—right where developers work.
Show HN: better-env – A Secure, Developer-Friendly Alternative to .env
Show HN (score: 6)[Other] Show HN: better-env – A Secure, Developer-Friendly Alternative to .env I’ve always hated how archaic .env files feel. Plaintext, easy to leak, and once they hit git history… you’re cooked. After accidentally committing secrets a few too many times, I finally asked myself: why don't we encrypt secrets just like passwords?<p>So I built better-env: a local, encrypted way to manage secrets without exposing plaintext all over your machine. One place for secrets, nothing sensitive in git, your secrets get directly loaded at runtime, project-wise.<p>It’s early, local-first, and still rough around the edges, but it already removed a whole category of stress from my workflow. I’d love feedback on whether this feels useful beyond solo devs, and what you’d want for team/CI setups.<p>It's open source too! (<a href="https://github.com/HarishChandran3304/better-env" rel="nofollow">https://github.com/HarishChandran3304/better-env</a>)
Show HN: Build the habit of writing meaningful commit messages
Hacker News (score: 35)[Other] Show HN: Build the habit of writing meaningful commit messages Too often I find myself being lazy with commit messages. But I don't want AI to write them for me... only i truly know why i wrote the code i did.<p>So why don't i get AI to help me get that into words from my head?<p>That's what i built: smartcommit asks you questions about your changes, then helps you articulate what you already know into a proper commit message. Captures the what, how, and why.<p>Built this after repeatedly being confused 6 months in a project as to why i made the change i had made...<p>Would love feedback!
Show HN: I turned algae into a bio-altimeter and put it on a weather balloon
Hacker News (score: 57)[Other] Show HN: I turned algae into a bio-altimeter and put it on a weather balloon Hi HN - My name is Andrew, and I'm a high school student.<p>This is a write-up on StratoSpore, a payload I designed and launched to the stratosphere. The goal was to test if we could estimate physical altitude based on algae fluorescence (using a lightweight ML model trained on the sensor data).<p>The blog post covers the full engineering mess/process, including:<p>- The Hardware: Designing PCBs for the AS7263 spectral sensor and Pi Zero 2 W.<p>-The biological altimeter: How I tried to correlate biological stress (fluorescence) with altitude.<p>- The Communications: A custom lossy compression algorithm I wrote to smash 1080p images down to 18x10 pixels so I could transmit them over LoRA (915 Mhz) in semi-real-time.<p>The payload is currently lost in a forest, but the telemetry data survived. The code and hardware designs are open source on GitHub: <a href="https://github.com/radeeyate/stratospore" rel="nofollow">https://github.com/radeeyate/stratospore</a><p>I'm happy to answer technical questions about the payload, software, or anything else you are curious about! Critique also appreciated!
Ghost
Product Hunt[CLI Tool] Detect process injection and memory tampering in Rust Built Ghost - scans processes for signs of malware injection. Catches shellcode, API hooks, process hollowing, thread hijacking, that stuff. Works on Windows, Linux, macOS. Pretty fast, scans 200 processes in about 5 seconds. Has both command line and terminal UI. Fair warning - you'll get false positives from browsers and game anti-cheat because they do weird memory stuff. So don't freak out if it flags Chrome. Open source, MIT license. Drop a star if you find it useful.
Core.stream
Product Hunt[API/SDK] Search and Alert on Livestream Content Data Core.stream delivers search and alerting on livestream content data. We are API first, enabling builders to create cool content. Our algorithm picks out consistent streamers with audiences and transcribes them using data from their live feed. We made a demo app of what you can build on us at whoistalkingabouttacos.com, fully using the core.stream api. Useful for developers, brand managers, searching for content trends, but can have wide-reaching applications.
UtilBolt
Product Hunt[Other] Your swiss army knife for productivity 115+ utility tools in one platform — AI content creators, developer utilities, image processors, and data converters. From AI blog generation to code formatting. Everything you need, instantly accessible.
Building the largest known Kubernetes cluster
Hacker News (score: 145)[Other] Building the largest known Kubernetes cluster