Libraries tagged by Packages discovery

lemax10/ocstan

5 Favers
94 Downloads

OCStan - Discover bugs in your code without running it. A nunomaduro/larastan wrapper for OctoberCMS

Go to Download


foxsocial/package-discover-plugin

1 Favers
1194 Downloads

Bundle multiple packages into root package

Go to Download


wonsik/larastan

0 Favers
1 Downloads

Larastan - Discover bugs in your code without running it. A phpstan/phpstan wrapper for Laravel

Go to Download


prettyyellowdog/lumenstan

0 Favers
99 Downloads

Lumenstan - Discover bugs in your code without running it. A phpstan/phpstan wrapper for Lumen based on Larastan

Go to Download


magdy-hakam/larastan

0 Favers
5 Downloads

Larastan - Discover bugs in your code without running it. A phpstan/phpstan wrapper for Laravel

Go to Download


lloople/php-credit-cards

0 Favers
3 Downloads

A PHP package to perform operations on debit and credit cards like format, validate brand, number and Luhn algorithm. It validates popular brands like Visa, Mastercard, American Express, etc.

Go to Download


emmsanuel-saleem/larastan-laravel-12

0 Favers
1 Downloads

Larastan - Discover bugs in your code without running it. A phpstan/phpstan extension for Laravel with enhanced Laravel 12 support

Go to Download


moofik/kitty-helloworld

0 Favers
3 Downloads

Hello World package for hello kitty

Go to Download


moofik/kitty

0 Favers
7 Downloads

Container for packages

Go to Download


roshandelpoor/register-php-app-in-eureka

1 Favers
25 Downloads

This Package is Eureka Client And it's a library that interacts with the Eureka Server to register, deregister, and discover other services. Finally, I Want To Emphasize that This is NOT New Package (ONLY Fix Bug for package piwvh/php-eureka) Because of My Microservices Projects that I have to custom it

Go to Download


eaglewatch/domain-search

0 Favers
15 Downloads

This package is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process

Go to Download


<< Previous