<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mohamed</title>
    <description>The latest articles on DEV Community by Mohamed (@medjahdi).</description>
    <link>https://dev.to/medjahdi</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2951773%2Fe6e92cca-6884-4a0a-9841-f7ea6589dcc9.jpeg</url>
      <title>DEV Community: Mohamed</title>
      <link>https://dev.to/medjahdi</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/medjahdi"/>
    <language>en</language>
    <item>
      <title>Meet ReVex: The Cyberpunk HTTP Repeater that lives in your DevTools ☠️</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Sun, 01 Feb 2026 21:32:40 +0000</pubDate>
      <link>https://dev.to/medjahdi/meet-revex-the-cyberpunk-http-repeater-that-lives-in-your-devtools-575</link>
      <guid>https://dev.to/medjahdi/meet-revex-the-cyberpunk-http-repeater-that-lives-in-your-devtools-575</guid>
      <description>&lt;p&gt;We’ve all been there.&lt;/p&gt;

&lt;p&gt;You’re browsing a target site, hunting for bugs or debugging an API. You spot a request you want to modify—maybe just to change a user ID or replay a payload.&lt;/p&gt;

&lt;p&gt;The Problem? To do that, you have to fire up Burp Suite (which takes memory), configure your browser proxy, install certificates, and deal with the lag. For a deep pentest, that’s fine. But for a quick check? It feels like overkill.&lt;/p&gt;

&lt;p&gt;I got tired of the context switching. I wanted something that lived inside the browser but offered more power than the standard "Edit and Resend" feature in Chrome/Firefox.&lt;/p&gt;

&lt;p&gt;So, I built ReVex.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjbhb57yi9o55qxf2gmu6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjbhb57yi9o55qxf2gmu6.png" alt=" " width="800" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🛡️ What is ReVex?&lt;br&gt;
ReVex (Request Vex) is a browser extension that brings a full HTTP Repeater environment directly into Firefox DevTools.&lt;/p&gt;

&lt;p&gt;It is designed for security researchers, bug bounty hunters, and frontend developers who need to debug traffic without leaving the tab. It features a high-contrast Cyberpunk/Hacker theme because, let’s be honest, we stare at screens all day—dark mode is non-negotiable.&lt;/p&gt;

&lt;p&gt;✨ Key Features&lt;br&gt;
Unlike standard network tools, ReVex is built for offensive security workflows:&lt;/p&gt;

&lt;p&gt;🔄 Instant Capture &amp;amp; Replay: All requests in your tab are automatically captured. Click one, modify the headers, method, or body, and hit SEND.&lt;/p&gt;

&lt;p&gt;🔓 CORS Bypass: It uses a background relay to bypass standard browser CORS restrictions, allowing you to send requests to any endpoint.&lt;/p&gt;

&lt;p&gt;🧠 Magic Decoder: Highlight any string (Base64, JWT, URL-encoded), and ReVex auto-detects and decodes it instantly. No more switching to CyberChef for simple tasks.&lt;/p&gt;

&lt;p&gt;⌨️ Copy as cURL: One-click generation of perfectly escaped cURL commands for your terminal.&lt;/p&gt;

&lt;p&gt;🛠️ Under the Hood&lt;br&gt;
ReVex is purely local. It does not transmit data to any cloud server. It uses the webRequest API to capture traffic and a background script to handle the replaying logic.&lt;/p&gt;

&lt;p&gt;I built it using Vanilla JS to keep it ultra-lightweight. No React bloat, no heavy dependencies. Just fast, raw performance.&lt;/p&gt;

&lt;p&gt;🚀 How to get it&lt;br&gt;
ReVex is open-source and available now.&lt;/p&gt;

&lt;p&gt;Firefox Add-on: &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/revex-hacker-s-http-repeater/" rel="noopener noreferrer"&gt;https://addons.mozilla.org/en-US/firefox/addon/revex-hacker-s-http-repeater/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GitHub (Source Code): &lt;a href="https://github.com/medjahdi/ReVex/" rel="noopener noreferrer"&gt;https://github.com/medjahdi/ReVex/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you find it useful for your bug bounty hunting or API development, please consider starring the repo on GitHub! It helps a lot.&lt;/p&gt;

&lt;p&gt;Happy Hacking. 👾&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;u&gt;☕ Support the Project&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;
ReVex is 100% free and open-source. If it helps you find a bug, saves you time, or you just like the cyberpunk vibe, you can support future development by buying me a coffee:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://www.paypal.com/ncp/payment/KRJ9SS2HJM57J" rel="noopener noreferrer"&gt;Donate via PayPal&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>bugbounty</category>
      <category>programming</category>
    </item>
    <item>
      <title>HellRush: Building a Python-Based DDoS Simulation Toolkit for Security Education</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Sun, 08 Jun 2025 14:45:31 +0000</pubDate>
      <link>https://dev.to/medjahdi/hellrush-building-a-python-based-ddos-simulation-toolkit-for-security-education-52f6</link>
      <guid>https://dev.to/medjahdi/hellrush-building-a-python-based-ddos-simulation-toolkit-for-security-education-52f6</guid>
      <description>&lt;h1&gt;
  
  
  HellRush: Building a Python-Based DDoS Simulation Toolkit for Security Education
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr2btm70z13wel7p9eczq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr2btm70z13wel7p9eczq.png" alt="Image description" width="800" height="286"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Overview
&lt;/h2&gt;

&lt;p&gt;I've built HellRush, an open-source educational toolkit that simulates various DDoS attack vectors and includes network reconnaissance tools. Written in pure Python with no external dependencies, it's designed specifically for security professionals and students to learn in controlled environments. &lt;a href="https://github.com/medjahdi/HellRush" rel="noopener noreferrer"&gt;Check it out on GitHub&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem with Security Education
&lt;/h2&gt;

&lt;p&gt;As someone who's spent years in cybersecurity, I've often encountered a significant problem when teaching network security concepts: the gap between theoretical knowledge and practical application.&lt;/p&gt;

&lt;p&gt;Theory alone doesn't prepare security professionals for real-world scenarios. But using actual attack tools in educational settings presents ethical and legal challenges.&lt;/p&gt;

&lt;p&gt;That's why I built HellRush – a comprehensive toolkit that bridges this gap while maintaining an ethical focus.&lt;/p&gt;

&lt;h2&gt;
  
  
  What HellRush Does
&lt;/h2&gt;

&lt;p&gt;HellRush consists of two main Python scripts:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Network Reconnaissance (&lt;code&gt;resolver.py&lt;/code&gt;)
&lt;/h3&gt;

&lt;p&gt;The first stage of any security assessment is reconnaissance. HellRush's resolver component handles:&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;
python
# Usage example
python resolver.py -d targetdomain.com
This performs:

Domain to IP resolution (including multiple IPs)
Port scanning across common service ports
Detailed visual output of findings
Here's a sample of the resolver output:

Resolver Output

2. DDoS Simulation Engine (hR.py)
The core component provides six different attack vectors:

Python
# Basic syntax
python hR.py -t TARGET_IP -a ATTACK_TYPE -p PORT -s SIZE -d DURATION
Available attack types include:

UDP Flood: Overwhelms ports with UDP traffic

Python
python hR.py -t 192.168.1.100 -a udp -p 53 -d 30
SYN Flood: Exploits TCP handshake process

Python
python hR.py -t 192.168.1.100 -a syn -p 80 -d 30
ICMP Flood: Ping-based flooding

Python
python hR.py -t 192.168.1.100 -a icmp -d 30
HTTP Flood: Web server request flooding

Python
python hR.py -t 192.168.1.100 -a http -p 80 -d 30
DNS Amplification: Simulates DNS amplification attacks

Python
python hR.py -t 192.168.1.100 -a dns -d 30
Slowloris: Connection exhaustion technique

Python
python hR.py -t 192.168.1.100 -a slowloris -p 80 -d 30
Technical Implementation Details
Pure Python Philosophy
I deliberately avoided external dependencies to make HellRush as portable as possible. Everything is built using the Python standard library:

Python
import socket
import random
import time
import threading
import argparse
import sys
import itertools
Multithreading for Realistic Simulation
Each attack vector runs in its own thread while a progress animation displays in the main thread:

Python
def launch_attack(attack_type, target_ip, target_port, packet_size, duration, stop_event):
    if attack_type == "udp":
        udp_flood(target_ip, target_port, packet_size, duration, stop_event)
    elif attack_type == "syn":
        syn_flood(target_ip, target_port, duration, stop_event)
    # Additional attack vectors...

# In main():
attack_thread = threading.Thread(target=launch_attack, 
                                args=(args.attack, args.target, args.port, 
                                      args.size, args.duration, stop_event))
animation_thread = threading.Thread(target=animate_attack, 
                                   args=(args.duration, stop_event))
Real-time Animation
For better UX, an animation shows attack progress:

Python
def animate_attack(duration, stop_event):
    spinner = itertools.cycle(['|', '/', '-', '\\'])
    start_time = time.time()
    while time.time() - start_time &amp;lt; duration and not stop_event.is_set():
        sys.stdout.write('\rAttacking... ' + next(spinner))
        sys.stdout.flush()
        time.sleep(0.1)
    sys.stdout.write('\rAttack finished.    \n')
Ethical Considerations
As a security tool developer, I take ethics seriously. HellRush is:

Educational - Created specifically for learning environments
Open source - Code transparency ensures no hidden functionality
Well-documented - Clear usage guidelines and ethical warnings
MIT Licensed - Requires ethical usage
Important: Using HellRush against systems without explicit permission is illegal and unethical.

Key Learning Points from Building HellRush
Socket Programming Nuances - Working with different protocols (UDP, TCP, ICMP) revealed interesting implementation challenges
Threading in Python - Managing thread synchronization with events for clean termination
User Experience - Even in CLI tools, progress indicators greatly improve usability
Ethical Design - Building guardrails into security tools from the beginning
What's Next?
I'm actively developing HellRush with several features planned:

Additional attack vectors
Reporting capabilities
Network traffic visualization
Defense mechanism testing
Try It Yourself
HellRush is available on GitHub under the MIT License:

bash
# Clone the repository
git clone https://github.com/medjahdi/HellRush.git

# Navigate to directory
cd HellRush

# View help
python hR.py -h
Contribute
If you're interested in network security education, I welcome:

Bug reports
Feature suggestions
Code contributions
Documentation improvements
What other features would you find useful in a security education toolkit? Let me know in the comments!
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>python</category>
      <category>network</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>RedTiger: Advanced Automated XSS Vulnerability Testing Tool</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Sat, 07 Jun 2025 22:38:30 +0000</pubDate>
      <link>https://dev.to/medjahdi/redtiger-advanced-automated-xss-vulnerability-testing-tool-4pdn</link>
      <guid>https://dev.to/medjahdi/redtiger-advanced-automated-xss-vulnerability-testing-tool-4pdn</guid>
      <description>&lt;h1&gt;
  
  
  RedTiger: Advanced Automated XSS Vulnerability Testing Tool
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu67o8s319y52pjzsaivw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu67o8s319y52pjzsaivw.png" alt="RedTiger Banner" width="416" height="464"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In today's digital landscape, web application security is more critical than ever. Cross-Site Scripting (XSS) remains one of the most prevalent security vulnerabilities according to OWASP Top 10, affecting countless websites and applications. Yet, the process of identifying these vulnerabilities can be time-consuming and complex, requiring multiple tools and manual correlation.&lt;/p&gt;

&lt;p&gt;Enter RedTiger – an all-in-one automated XSS vulnerability testing tool designed to streamline security assessments with intelligent endpoint filtering and an elegant terminal UI. As a cybersecurity professional, I developed RedTiger to address the challenges of efficient XSS testing at scale.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem RedTiger Solves
&lt;/h2&gt;

&lt;p&gt;XSS vulnerability testing traditionally involves several disjointed steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Discovering subdomains&lt;/li&gt;
&lt;li&gt;Filtering viable targets&lt;/li&gt;
&lt;li&gt;Finding endpoints with parameters&lt;/li&gt;
&lt;li&gt;Testing each endpoint for XSS vulnerabilities&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This fragmented approach often leads to inefficiencies, missed vulnerabilities, and excessive time spent switching between tools. RedTiger transforms this process into a seamless, automated workflow that handles each step methodically while providing real-time feedback.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features
&lt;/h2&gt;

&lt;p&gt;RedTiger combines power and elegance with these standout features:&lt;/p&gt;

&lt;h3&gt;
  
  
  🔍 Comprehensive Scanning Pipeline
&lt;/h3&gt;

&lt;p&gt;RedTiger automates the complete XSS testing workflow:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Subdomain Enumeration&lt;/strong&gt;: Discovers all related subdomains for thorough coverage&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intelligent Link Filtering&lt;/strong&gt;: Focuses on potentially vulnerable endpoints&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Parameter Detection&lt;/strong&gt;: Tests only endpoints with parameters (containing "?")&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;XSS Vulnerability Testing&lt;/strong&gt;: Employs sophisticated payload testing&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🎯 Efficiency Through Smart Filtering
&lt;/h3&gt;

&lt;p&gt;Not all endpoints are created equal when it comes to XSS vulnerability. RedTiger intelligently filters:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Live and responsive subdomains only&lt;/li&gt;
&lt;li&gt;Endpoints containing query parameters&lt;/li&gt;
&lt;li&gt;URLs likely to process user input&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This targeted approach dramatically reduces testing time while maintaining comprehensive coverage.&lt;/p&gt;

&lt;h3&gt;
  
  
  🖥️ Beautiful Terminal User Interface
&lt;/h3&gt;

&lt;p&gt;Security tools don't need to be visually bland. RedTiger features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Animated progress indicators&lt;/li&gt;
&lt;li&gt;Color-coded outputs for instant status recognition&lt;/li&gt;
&lt;li&gt;Clear section dividers for each testing phase&lt;/li&gt;
&lt;li&gt;Real-time statistics and completion percentages&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  📊 Comprehensive Reporting
&lt;/h3&gt;

&lt;p&gt;RedTiger provides detailed insights at each stage:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Subdomain discovery metrics&lt;/li&gt;
&lt;li&gt;Link filtering statistics&lt;/li&gt;
&lt;li&gt;Endpoint extraction counts&lt;/li&gt;
&lt;li&gt;XSS vulnerability findings with severity ratings&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Technical Implementation
&lt;/h2&gt;

&lt;p&gt;RedTiger orchestrates several specialized tools to accomplish its mission:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;subfinder&lt;/code&gt;&lt;/strong&gt;: For fast and efficient subdomain discovery&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;katana&lt;/code&gt;&lt;/strong&gt;: For intelligent web crawling and endpoint extraction&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;XnovaX&lt;/code&gt;&lt;/strong&gt;: For filtering and processing viable target links&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;code&gt;XSSNOVA&lt;/code&gt;&lt;/strong&gt;: For advanced XSS payload testing and vulnerability detection&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The architecture follows a pipeline pattern where the output of each stage feeds into the next, with appropriate filtering and processing between stages.&lt;/p&gt;

&lt;h3&gt;
  
  
  Workflow Visualization
&lt;/h3&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Input Domain → Subdomain Enumeration → Link Filtering → Endpoint Extraction → Parameter Filtering → XSS Testing → Vulnerability Report
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Installation and Setup
&lt;/h2&gt;

&lt;p&gt;Getting started with RedTiger is straightforward:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Clone the repository:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/medjahdi/RedTiger.git
&lt;span class="nb"&gt;cd &lt;/span&gt;RedTiger
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Make the script executable:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;chmod&lt;/span&gt; +x redtiger.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Install dependencies (if not already installed):
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Install subfinder&lt;/span&gt;
&lt;span class="nv"&gt;GO111MODULE&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;on go get &lt;span class="nt"&gt;-v&lt;/span&gt; github.com/projectdiscovery/subfinder/v2/cmd/subfinder

&lt;span class="c"&gt;# Install katana&lt;/span&gt;
&lt;span class="nv"&gt;GO111MODULE&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;on go get &lt;span class="nt"&gt;-v&lt;/span&gt; github.com/projectdiscovery/katana/cmd/katana
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Ensure the proper directory structure:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;RedTiger/
├── redtiger.sh
├── XnovaX/
│   └── xnovax.py
└── XSSNOVA/
    └── xssnova.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Using RedTiger
&lt;/h2&gt;

&lt;p&gt;Run RedTiger against a target domain with a simple command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;./redtiger.sh example.com
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The tool automatically creates an organized directory structure for the target domain, storing results from each phase of testing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;example.com/
├── subdomains.txt     # All discovered subdomains
├── clean_livesubs.txt # Filtered useful links
├── endpoints.txt      # All extracted endpoints
└── attack.txt         # Endpoints with parameters for XSS testing
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Real-World Applications
&lt;/h2&gt;

&lt;p&gt;RedTiger excels in various security testing scenarios:&lt;/p&gt;

&lt;h3&gt;
  
  
  Bug Bounty Hunting
&lt;/h3&gt;

&lt;p&gt;Quickly scan target domains for XSS vulnerabilities, giving you a competitive edge in finding reportable issues before others.&lt;/p&gt;

&lt;h3&gt;
  
  
  Security Assessments
&lt;/h3&gt;

&lt;p&gt;Perform comprehensive XSS testing during security assessments, providing clients with actionable vulnerability reports.&lt;/p&gt;

&lt;h3&gt;
  
  
  Continuous Security Testing
&lt;/h3&gt;

&lt;p&gt;Integrate RedTiger into CI/CD pipelines to test for XSS vulnerabilities before deployment.&lt;/p&gt;

&lt;h3&gt;
  
  
  Educational Use
&lt;/h3&gt;

&lt;p&gt;Learn about XSS vulnerabilities and web application security by observing how RedTiger identifies potential injection points.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Journey Behind RedTiger
&lt;/h2&gt;

&lt;p&gt;As a cybersecurity professional specializing in web application security, I repeatedly found myself manually chaining together tools to perform XSS testing. Each assessment required the same sequence of actions with different target domains. I created RedTiger to automate this process and to provide a more elegant, efficient solution.&lt;/p&gt;

&lt;p&gt;The development process involved careful selection of dependencies, refining the filtering logic to minimize false positives, and designing a user interface that provides clarity during intensive scanning operations.&lt;/p&gt;

&lt;h2&gt;
  
  
  What's Next for RedTiger
&lt;/h2&gt;

&lt;p&gt;The development roadmap includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Expanded vulnerability testing beyond XSS (SQL injection, CSRF, etc.)&lt;/li&gt;
&lt;li&gt;Customizable reporting formats (HTML, PDF, JSON)&lt;/li&gt;
&lt;li&gt;Integration with vulnerability management platforms&lt;/li&gt;
&lt;li&gt;Advanced payload generation using machine learning&lt;/li&gt;
&lt;li&gt;Collaboration features for security teams&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  About the Author
&lt;/h2&gt;

&lt;p&gt;I'm Med Jahdi, a cybersecurity researcher and ethical hacker passionate about web application security. With expertise in vulnerability assessment and penetration testing, I focus on creating tools that make security testing more efficient and accessible.&lt;/p&gt;

&lt;h3&gt;
  
  
  Connect with Me
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GitHub: &lt;a href="https://github.com/medjahdi" rel="noopener noreferrer"&gt;https://github.com/medjahdi&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Portfolio: &lt;a href="https://medjahdi.github.io" rel="noopener noreferrer"&gt;https://medjahdi.github.io&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Support This Project
&lt;/h2&gt;

&lt;p&gt;If you find RedTiger useful in your security testing workflow, consider supporting its continued development:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.paypal.com/ncp/payment/W5SHTZX6LZH86" rel="noopener noreferrer"&gt;https://www.paypal.com/ncp/payment/W5SHTZX6LZH86&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Your support helps maintain and improve RedTiger while enabling the development of new security tools for the community.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;In the ever-evolving landscape of web security, efficient vulnerability detection tools are essential. RedTiger combines multiple testing phases into a seamless workflow, allowing security professionals to identify XSS vulnerabilities with unprecedented efficiency.&lt;/p&gt;

&lt;p&gt;Whether you're a bug bounty hunter, security consultant, or developer concerned about application security, RedTiger provides the automated intelligence needed to find vulnerabilities before malicious actors do.&lt;/p&gt;

&lt;p&gt;I welcome your feedback and contributions to make RedTiger even better. Feel free to open issues, submit pull requests, or reach out with suggestions.&lt;/p&gt;




&lt;p&gt;⚠️ &lt;strong&gt;Disclaimer:&lt;/strong&gt; RedTiger is designed for ethical security testing only. Always ensure you have proper authorization before testing any domain or application.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>automation</category>
      <category>testing</category>
      <category>vulnerabilities</category>
    </item>
    <item>
      <title>WhoWeB Scanner - Simple Website Scanner Tool</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Wed, 19 Mar 2025 17:49:04 +0000</pubDate>
      <link>https://dev.to/medjahdi/whoweb-scanner-simple-website-scanner-tool-570l</link>
      <guid>https://dev.to/medjahdi/whoweb-scanner-simple-website-scanner-tool-570l</guid>
      <description>&lt;h3&gt;
  
  
  WhoWeB Scanner - Simple Website Scanner Tool
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; &lt;a class="mentioned-user" href="https://dev.to/medjahdi"&gt;@medjahdi&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;strong&gt;License:&lt;/strong&gt; Python License  &lt;/p&gt;




&lt;h3&gt;
  
  
  🔍 Introduction
&lt;/h3&gt;

&lt;p&gt;WhoWeB Scanner is a simple yet powerful website scanning tool designed to gather basic information about a website. This tool is intended for &lt;strong&gt;educational and informational purposes only&lt;/strong&gt; and should be used responsibly.&lt;/p&gt;




&lt;h3&gt;
  
  
  🚀 Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Extracts &lt;strong&gt;all links&lt;/strong&gt; from a webpage.&lt;/li&gt;
&lt;li&gt;Detects &lt;strong&gt;cookies&lt;/strong&gt; used on the site.&lt;/li&gt;
&lt;li&gt;Retrieves &lt;strong&gt;website IP address&lt;/strong&gt; and its &lt;strong&gt;associated country&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Finds &lt;strong&gt;email addresses&lt;/strong&gt; (if present in &lt;code&gt;mailto&lt;/code&gt; links).&lt;/li&gt;
&lt;li&gt;Checks for &lt;strong&gt;Apache server&lt;/strong&gt; and &lt;strong&gt;PHP usage&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Identifies the presence of &lt;strong&gt;Google Analytics&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Detects &lt;strong&gt;frames&lt;/strong&gt; on the webpage.&lt;/li&gt;
&lt;li&gt;Lists &lt;strong&gt;uncommon HTTP headers&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Displays &lt;strong&gt;page title&lt;/strong&gt; and the number of &lt;strong&gt;meta tags&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🛠 Installation &amp;amp; Usage
&lt;/h3&gt;

&lt;h4&gt;
  
  
  1️⃣ Prerequisites
&lt;/h4&gt;

&lt;p&gt;Ensure you have &lt;strong&gt;Python 3.x&lt;/strong&gt; installed on your system.&lt;/p&gt;

&lt;h4&gt;
  
  
  2️⃣ Install Required Libraries
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;pip &lt;span class="nb"&gt;install &lt;/span&gt;requests beautifulsoup4 colorama
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  3️⃣ Run the Scanner
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python whoweb_scanner.py &lt;span class="o"&gt;[&lt;/span&gt;URL]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Replace &lt;code&gt;[URL]&lt;/code&gt; with the website you want to scan.&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Disclaimer
&lt;/h3&gt;

&lt;p&gt;🚨 &lt;strong&gt;Important:&lt;/strong&gt; This tool is for &lt;strong&gt;educational and research purposes only&lt;/strong&gt;. Unauthorized scanning of websites may violate their terms of service. Use responsibly.&lt;/p&gt;




&lt;h3&gt;
  
  
  💻 Author
&lt;/h3&gt;

&lt;p&gt;Developed by &lt;strong&gt;&lt;a class="mentioned-user" href="https://dev.to/medjahdi"&gt;@medjahdi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;📌 &lt;strong&gt;GitHub Repository&lt;/strong&gt;: &lt;a href="https://github.com/medjahdi/WhoWeb" rel="noopener noreferrer"&gt;WhoWeB Scanner&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>security</category>
      <category>cybersecurity</category>
      <category>python</category>
    </item>
    <item>
      <title>LAKASA-WIFI - Wi-Fi Connection Script</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Wed, 19 Mar 2025 17:40:38 +0000</pubDate>
      <link>https://dev.to/medjahdi/lakasa-wifi-wi-fi-connection-script-92j</link>
      <guid>https://dev.to/medjahdi/lakasa-wifi-wi-fi-connection-script-92j</guid>
      <description>&lt;h3&gt;
  
  
  LAKASA-WIFI - Wi-Fi Connection Script
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; &lt;a class="mentioned-user" href="https://dev.to/medjahdi"&gt;@medjahdi&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Introduction
&lt;/h4&gt;

&lt;p&gt;LAKASA-WIFI is a Python script designed to connect to Wi-Fi networks using either a wordlist or a randomly generated password. This project is strictly for &lt;strong&gt;educational purposes only&lt;/strong&gt; and should be used responsibly.&lt;/p&gt;




&lt;h3&gt;
  
  
  🚀 Features
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Print Logo&lt;/strong&gt;: Displays a custom logo and title.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;List Networks&lt;/strong&gt;: Scans and lists available Wi-Fi networks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Connect to Network&lt;/strong&gt;: Attempts to connect to a specified Wi-Fi network using a password.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Wordlist Mode&lt;/strong&gt;: Uses a predefined wordlist to attempt Wi-Fi connections.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Random Password Mode&lt;/strong&gt;: Generates and tests random passwords of a specified length.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  🛠 Installation &amp;amp; Usage
&lt;/h3&gt;

&lt;h4&gt;
  
  
  1️⃣ Clone the Repository:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/medjahdi/LAKASA-WIFI.git
&lt;span class="nb"&gt;cd &lt;/span&gt;LAKASA-WIFI
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  2️⃣ Run the Script:
&lt;/h4&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python main.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  3️⃣ Follow the Prompts:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Enter the &lt;strong&gt;SSID&lt;/strong&gt; of the target network.&lt;/li&gt;
&lt;li&gt;Choose between &lt;strong&gt;Wordlist Mode&lt;/strong&gt; or &lt;strong&gt;Random Password Mode&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  📸 Screenshot
&lt;/h3&gt;

&lt;p&gt;(Attach project logo or relevant screenshots here)&lt;/p&gt;




&lt;h3&gt;
  
  
  ⚠️ Disclaimer
&lt;/h3&gt;

&lt;p&gt;🚨 &lt;strong&gt;Important:&lt;/strong&gt; This script is for &lt;strong&gt;educational and research purposes only&lt;/strong&gt;. Unauthorized access to networks is illegal and strictly prohibited. The author holds no responsibility for misuse.&lt;/p&gt;




&lt;h3&gt;
  
  
  💻 Author
&lt;/h3&gt;

&lt;p&gt;Developed by &lt;strong&gt;&lt;a class="mentioned-user" href="https://dev.to/medjahdi"&gt;@medjahdi&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;📌 &lt;strong&gt;GitHub Repository&lt;/strong&gt;: &lt;a href="https://github.com/medjahdi/LAKASA-WIFI" rel="noopener noreferrer"&gt;LAKASA-WIFI&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>wifi</category>
      <category>opensource</category>
      <category>hacker</category>
    </item>
    <item>
      <title>🚀 Student Management System - A Python &amp; MySQL-Based Solution</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Wed, 19 Mar 2025 17:38:05 +0000</pubDate>
      <link>https://dev.to/medjahdi/student-management-system-a-python-mysql-based-solution-1g3</link>
      <guid>https://dev.to/medjahdi/student-management-system-a-python-mysql-based-solution-1g3</guid>
      <description>&lt;p&gt;📌 IntroductionManaging student data efficiently is crucial for educational institutions. Student Management System is a powerful Python-based solution that integrates MySQL for seamless database operations. This open-source project allows users to perform CRUD operations, search student records, and even export data to CSV files.&lt;/p&gt;

&lt;p&gt;🔹 Features&lt;/p&gt;

&lt;p&gt;✅ Add Student – Easily add new student records to the database.✅ Delete Student – Remove students by ID.✅ Update Student – Modify student information effortlessly.✅ Search Student – Find students using ID or name.✅ Display All Students – View all stored records.✅ Export to CSV – Download student records for external use.&lt;/p&gt;

&lt;p&gt;🛠️ Getting Started&lt;/p&gt;

&lt;p&gt;🔹 Prerequisites&lt;/p&gt;

&lt;p&gt;Ensure you have the following installed:&lt;/p&gt;

&lt;p&gt;Python 3.x – Download Here&lt;/p&gt;

&lt;p&gt;MySQL – Install MySQL&lt;/p&gt;

&lt;p&gt;🔹 Database Setup&lt;/p&gt;

&lt;p&gt;1️⃣ Open MySQL and create a new database:&lt;/p&gt;

&lt;p&gt;mysql -u root -p&lt;br&gt;
CREATE DATABASE student_management;&lt;br&gt;
USE student_management;&lt;/p&gt;

&lt;p&gt;2️⃣ Create the students table:&lt;/p&gt;

&lt;p&gt;CREATE TABLE students (&lt;br&gt;
    id VARCHAR(10) PRIMARY KEY,&lt;br&gt;
    name VARCHAR(50),&lt;br&gt;
    surname VARCHAR(50),&lt;br&gt;
    dob DATE,&lt;br&gt;
    address VARCHAR(100),&lt;br&gt;
    nationality VARCHAR(50),&lt;br&gt;
    faculty VARCHAR(50),&lt;br&gt;
    department VARCHAR(50),&lt;br&gt;
    specialization VARCHAR(50),&lt;br&gt;
    year VARCHAR(10)&lt;br&gt;
);&lt;/p&gt;

&lt;p&gt;📥 Installation&lt;/p&gt;

&lt;p&gt;Clone the repository and install dependencies:&lt;/p&gt;

&lt;p&gt;git clone &lt;a href="https://github.com/medjahdi/student-management-system.git" rel="noopener noreferrer"&gt;https://github.com/medjahdi/student-management-system.git&lt;/a&gt;&lt;br&gt;
cd student-management-system&lt;br&gt;
pip install mysql-connector-python termcolor&lt;/p&gt;

&lt;p&gt;🚀 Running the Application&lt;/p&gt;

&lt;p&gt;Launch the program with:&lt;/p&gt;

&lt;p&gt;python start.py&lt;/p&gt;

&lt;p&gt;📂 Project Structure&lt;/p&gt;

&lt;p&gt;📌 start.py – Main script to run the application.📌 login.py – Handles authentication with hashed passwords.📌 app.py – Contains CRUD operations &amp;amp; export functionality.📌 README.md – Project overview.&lt;/p&gt;

&lt;p&gt;🔒 Login Security&lt;br&gt;
The application uses SHA-256 hashed passwords for authentication. The default password is "nova".&lt;/p&gt;

&lt;p&gt;🖼️ Screenshots&lt;/p&gt;

&lt;p&gt;💻 Login Screen&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw4exh15u62amm7b2ow09.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw4exh15u62amm7b2ow09.png" alt="Image description" width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📊 Main Program Interface&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdrd4nm8pln6z0ih4dngd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdrd4nm8pln6z0ih4dngd.png" alt="Image description" width="800" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🛠️ Contributing&lt;/p&gt;

&lt;p&gt;We welcome contributions! Follow these steps:&lt;br&gt;
1️⃣ Fork the repo.2️⃣ Create a feature branch: git checkout -b feature/YourFeatureName.3️⃣ Commit changes: git commit -m 'Add feature XYZ'.4️⃣ Push: git push origin feature/YourFeatureName.5️⃣ Open a pull request.&lt;/p&gt;

&lt;p&gt;📜 License&lt;/p&gt;

&lt;p&gt;🔒 This project does not have a license. All rights reserved by &lt;a class="mentioned-user" href="https://dev.to/medjahdi"&gt;@medjahdi&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;📩 Contact &amp;amp; More&lt;/p&gt;

&lt;p&gt;💻 GitHub: Student Management System🌐 Portfolio: medjahdi.github.io📧 Email: &lt;a href="mailto:medjahdi.mohamed@outlook.com"&gt;medjahdi.mohamed@outlook.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📌 Let me know what you think about this project in the comments! 🚀&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Wed, 19 Mar 2025 17:34:17 +0000</pubDate>
      <link>https://dev.to/medjahdi/introducing-pyeye-a-powerful-tool-for-extracting-endpoints-and-paths-5ng</link>
      <guid>https://dev.to/medjahdi/introducing-pyeye-a-powerful-tool-for-extracting-endpoints-and-paths-5ng</guid>
      <description>&lt;p&gt;Hey everyone!&lt;/p&gt;

&lt;p&gt;I'm excited to introduce PyEYE, a powerful tool designed to extract endpoints and paths from websites by analyzing HTML content and associated resources. It identifies potential API endpoints, routes, and file paths which can be useful for security research, web mapping, and application analysis.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Features:&lt;/strong&gt;&lt;br&gt;
Extracts endpoints and paths from websites&lt;br&gt;
Analyzes HTML content and associated resources&lt;br&gt;
Identifies potential API endpoints, routes, and file paths&lt;br&gt;
Useful for security research, web mapping, and application analysis&lt;br&gt;
**Repository:&lt;br&gt;
**Check out the **PyEYE **repository on GitHub for more details and to get started! &lt;a href="https://github.com/medjahdi/PyEYE" rel="noopener noreferrer"&gt;https://github.com/medjahdi/PyEYE&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;**Language:&lt;br&gt;
**PyEYE is written entirely in Python.&lt;/p&gt;

</description>
      <category>python</category>
      <category>security</category>
      <category>webdev</category>
      <category>opensource</category>
    </item>
    <item>
      <title>🚀 Dzair GPT – Algeria’s First AI Chatbot API! 🇩🇿🤖</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Mon, 17 Mar 2025 21:18:20 +0000</pubDate>
      <link>https://dev.to/medjahdi/dzair-gpt-algerias-first-ai-chatbot-api-kel</link>
      <guid>https://dev.to/medjahdi/dzair-gpt-algerias-first-ai-chatbot-api-kel</guid>
      <description>&lt;p&gt;Hey everyone! I’m excited to introduce Dzair GPT, an AI chatbot built with a custom API for businesses &amp;amp; developers looking to integrate NLP automation into their projects.&lt;/p&gt;

&lt;p&gt;🔹 Key Features:&lt;br&gt;
✅ Smart AI responses with advanced prompt engineering&lt;br&gt;
✅ Multiple integrations – Web API, CLI, and Python SDK&lt;br&gt;
✅ Real-time performance with caching &amp;amp; streaming&lt;br&gt;
✅ Custom API for businesses &amp;amp; startups&lt;/p&gt;

&lt;p&gt;💡 Who is this for?&lt;br&gt;
🔹 Developers looking for an AI-powered chatbot API&lt;br&gt;
🔹 Businesses wanting automated AI customer support&lt;br&gt;
🔹 Tech enthusiasts exploring AI in Algeria &amp;amp; beyond&lt;/p&gt;

&lt;p&gt;🔥 Try Dzair GPT Now!&lt;br&gt;
🔗 Demo: dzair-gpt.vercel.app&lt;br&gt;
📖 Docs: docs-dzair-gpt.vercel.app&lt;br&gt;
📩 Interested in API access? Contact me!&lt;br&gt;
📧 Email: &lt;a href="mailto:medjahdi.mohamed@outlook.com"&gt;medjahdi.mohamed@outlook.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Would love to hear your feedback &amp;amp; thoughts! 🚀&lt;/p&gt;

&lt;h1&gt;
  
  
  AI #DzairGPT #APIs #Chatbot #MachineLearning #Tech #Algeria
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>Introducing Dzair GPT – A Custom AI Chatbot API for Businesses</title>
      <dc:creator>Mohamed</dc:creator>
      <pubDate>Mon, 17 Mar 2025 21:06:00 +0000</pubDate>
      <link>https://dev.to/medjahdi/introducing-dzair-gpt-a-custom-ai-chatbot-api-for-businesses-2k2b</link>
      <guid>https://dev.to/medjahdi/introducing-dzair-gpt-a-custom-ai-chatbot-api-for-businesses-2k2b</guid>
      <description>&lt;p&gt;🚀 Dzair GPT – Algeria’s First AI Chatbot API! 🇩🇿🤖&lt;/p&gt;

&lt;p&gt;Hey everyone! I’m excited to introduce Dzair GPT, an AI chatbot built with a custom API for businesses &amp;amp; developers looking to integrate NLP automation into their projects.&lt;/p&gt;

&lt;p&gt;🔹 Key Features:&lt;br&gt;
✅ Smart AI responses with advanced prompt engineering&lt;br&gt;
✅ Multiple integrations – Web API, CLI, and Python SDK&lt;br&gt;
✅ Real-time performance with caching &amp;amp; streaming&lt;br&gt;
✅ Custom API for businesses &amp;amp; startups&lt;/p&gt;

&lt;p&gt;💡 Who is this for?&lt;br&gt;
🔹 Developers looking for an AI-powered chatbot API&lt;br&gt;
🔹 Businesses wanting automated AI customer support&lt;br&gt;
🔹 Tech enthusiasts exploring AI in Algeria &amp;amp; beyond&lt;/p&gt;

&lt;p&gt;🔥 Try Dzair GPT Now!&lt;br&gt;
🔗 Demo: dzair-gpt.vercel.app&lt;br&gt;
📖 Docs: docs-dzair-gpt.vercel.app&lt;br&gt;
📩 Interested in API access? Contact me!&lt;br&gt;
📧 Email: &lt;a href="mailto:medjahdi.mohamed@outlook.com"&gt;medjahdi.mohamed@outlook.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Would love to hear your feedback &amp;amp; thoughts! 🚀&lt;/p&gt;

&lt;h1&gt;
  
  
  AI #DzairGPT #APIs #Chatbot #MachineLearning #Tech #Algeria
&lt;/h1&gt;

</description>
    </item>
  </channel>
</rss>
