Developer Tools AI Tools
Discover and compare the best developer tools AI tools and software. Browse 436+ curated tools with reviews and ratings.
Discover and compare the best developer tools AI tools and software. Browse 436+ curated tools with reviews and ratings.
Macky is a secure, real-time mobile terminal client that lets you access and control your Mac's terminal from your iPhone. It supports Zsh, Bash, Claude Code, and Codex over end-to-end encrypted WebRTC.
git-lrc is a free AI code review tool that hooks into git commit to automatically review every diff before it lands. It catches issues like leaked credentials, logic removal, and expensive cloud calls.
Rork Max is the most advanced AI for building mobile apps with superior design capabilities and incredible performance. It builds apps for every Apple platform including iPhone, iPad, Apple Watch, Apple TV, Vision Pro, and iMessage.
Clime is a CLI tool that helps discover, install, and run command-line tools for both AI agents and developers. It provides access to 845 CLIs with curated workflows and structured results.
IPAware provides an unlimited IP intelligence API with flat-rate pricing for accurate IP geolocation and threat detection. It offers VPN/proxy detection and ASN lookup without request limits or overage fees.
Create a beautiful shadcn/ui theme in a few clicks by picking a color and font. Preview it live and ship production-ready theme CSS for Tailwind v4.
moCODE is the mobile companion for OpenCode/KiloCode Server that brings AI-assisted coding to mobile devices. It allows developers to write, review, and ship code from anywhere.
Coasty provides AI agents that control real computers to automate tasks end-to-end. They browse, code, and complete tasks autonomously using isolated virtual machines.
Dreamer is a platform for discovering, building, and enjoying agentic apps. It enables users to create custom AI agents that work together to automate tasks and connect services.
Keychains.dev is a secure credential proxy for AI agents that allows them to access APIs without exposing sensitive credentials. Users maintain full control with scoped, transparent, and revocable permissions.