5 Commits

Author SHA1 Message Date
d33fa32edb Merge version_2 into main
Merge version_2 into main
2026-03-05 00:15:03 +00:00
a7ea20efb2 Update theme colors 2026-03-05 00:14:57 +00:00
3065b9fa42 Merge version_2 into main
Merge version_2 into main
2026-03-04 23:04:48 +00:00
479eae146d Update src/app/page.tsx 2026-03-04 23:04:44 +00:00
8882efd786 Update src/app/layout.tsx 2026-03-04 23:04:43 +00:00
3 changed files with 67 additions and 186 deletions

View File

@@ -7,48 +7,33 @@ import { ServiceWrapper } from "@/components/ServiceWrapper";
import Tag from "@/tag/Tag"; import Tag from "@/tag/Tag";
const halant = Halant({ const halant = Halant({
variable: "--font-halant", variable: "--font-halant", subsets: ["latin"],
subsets: ["latin"],
weight: ["300", "400", "500", "600", "700"], weight: ["300", "400", "500", "600", "700"],
}); });
const inter = Inter({ const inter = Inter({
variable: "--font-inter", variable: "--font-inter", subsets: ["latin"],
subsets: ["latin"],
}); });
const poppins = Poppins({ const poppins = Poppins({
variable: "--font-poppins", variable: "--font-poppins", subsets: ["latin"],
subsets: ["latin"],
weight: ["100", "200", "300", "400", "500", "600", "700", "800", "900"], weight: ["100", "200", "300", "400", "500", "600", "700", "800", "900"],
}); });
export const metadata: Metadata = { export const metadata: Metadata = {
title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training", title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training", description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.", keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity", metadataBase: new URL("https://blackhatethicalhacking.com"),
description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.",
keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity",
metadataBase: new URL("https://blackhatethicalhacking.com"),
alternates: { alternates: {
canonical: "https://blackhatethicalhacking.com" canonical: "https://blackhatethicalhacking.com"
}, },
openGraph: { openGraph: {
title: "Black Hat Ethical Hacking - Offensive Security Expertise", title: "Black Hat Ethical Hacking - Offensive Security Expertise", description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.", url: "https://blackhatethicalhacking.com", siteName: "Black Hat Ethical Hacking", type: "website", images: [
description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.",
url: "https://blackhatethicalhacking.com",
siteName: "Black Hat Ethical Hacking",
type: "website",
images: [
{ {
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", alt: "Black Hat Ethical Hacking - Security Operations Center"
alt: "Black Hat Ethical Hacking - Security Operations Center"
} }
] ]
}, },
twitter: { twitter: {
card: "summary_large_image", card: "summary_large_image", title: "Black Hat Ethical Hacking - Penetration Testing & Security Training", description: "Learn vulnerabilities before attackers do. Expert offensive security services.", images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
title: "Black Hat Ethical Hacking - Penetration Testing & Security Training",
description: "Learn vulnerabilities before attackers do. Expert offensive security services.",
images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
}, },
robots: { robots: {
index: true, index: true,
@@ -1440,4 +1425,4 @@ export default function RootLayout({
</ServiceWrapper> </ServiceWrapper>
</html> </html>
); );
} }

View File

@@ -48,9 +48,7 @@ export default function HomePage() {
{ name: "Resources", id: "resources" }, { name: "Resources", id: "resources" },
]} ]}
button={{ button={{
text: "Explore Solutions", text: "Explore Solutions", href: "/services"}}
href: "/services",
}}
animateOnLoad={true} animateOnLoad={true}
/> />
</div> </div>
@@ -66,21 +64,15 @@ export default function HomePage() {
slides={[ slides={[
{ {
imageSrc: imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", imageAlt:
imageAlt: "Security operations center with offensive security controls"},
"Security operations center with offensive security controls",
},
{ {
imageSrc: imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png", imageAlt: "Network attack visualization and threat pathways"},
imageAlt: "Network attack visualization and threat pathways",
},
{ {
imageSrc: imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png", imageAlt:
imageAlt: "Red team operations and security assessments"},
"Red team operations and security assessments",
},
]} ]}
autoplayDelay={4000} autoplayDelay={4000}
showDimOverlay={true} showDimOverlay={true}
@@ -95,14 +87,10 @@ export default function HomePage() {
{ icon: Target, label: "Critical Tests Delivered", value: "500+" }, { icon: Target, label: "Critical Tests Delivered", value: "500+" },
{ {
icon: Users, icon: Users,
label: "Security Professionals", label: "Security Professionals", value: "2,500+"},
value: "2,500+",
},
{ {
icon: Globe, icon: Globe,
label: "Enterprise Clients Secured", label: "Enterprise Clients Secured", value: "200+"},
value: "200+",
},
]} ]}
metricsAnimation="slide-up" metricsAnimation="slide-up"
useInvertedBackground={false} useInvertedBackground={false}
@@ -117,29 +105,17 @@ export default function HomePage() {
tagIcon={Zap} tagIcon={Zap}
features={[ features={[
{ {
title: "Penetration Testing Services", title: "Penetration Testing Services", description:
description: "Expert manual security assessments targeting real-world attack vectors and business-critical systems.", bentoComponent: "globe"},
"Expert manual security assessments targeting real-world attack vectors and business-critical systems.",
bentoComponent: "globe",
},
{ {
title: "Vulnerability Management", title: "Vulnerability Management", description:
description: "Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.", bentoComponent: "animated-bar-chart"},
"Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.",
bentoComponent: "animated-bar-chart",
},
{ {
title: "Red Team Operations", title: "Red Team Operations", description:
description: "Advanced adversary simulations and multi-phase engagement scenarios.", bentoComponent: "map"},
"Advanced adversary simulations and multi-phase engagement scenarios.",
bentoComponent: "map",
},
{ {
title: "Exploit Development", title: "Exploit Development", description:
description: "Zero-day research and advanced exploitation technique training.", bentoComponent: "line-chart"},
"Zero-day research and advanced exploitation technique training.",
bentoComponent: "line-chart",
},
]} ]}
textboxLayout="default" textboxLayout="default"
animationType="slide-up" animationType="slide-up"
@@ -155,83 +131,44 @@ export default function HomePage() {
tagIcon={DollarSign} tagIcon={DollarSign}
plans={[ plans={[
{ {
id: "assessment", id: "assessment", badge: "Vulnerability Assessment", badgeIcon: Search,
badge: "Vulnerability Assessment", price: "Custom Pricing", subtitle:
badgeIcon: Search, "Ideal for SMBs seeking foundational security insights", buttons: [
price: "Custom Pricing",
subtitle:
"Ideal for SMBs seeking foundational security insights",
buttons: [
{ text: "Request Quote", href: "/contact" }, { text: "Request Quote", href: "/contact" },
{ text: "Learn More", href: "#" }, { text: "Learn More", href: "#" },
], ],
features: [ features: [
"Scope Definition & Reconnaissance", "Scope Definition & Reconnaissance", "Active Vulnerability Scanning", "Manual Testing of High-Risk Areas", "Detailed Assessment Report", "Remediation Roadmap"],
"Active Vulnerability Scanning",
"Manual Testing of High-Risk Areas",
"Detailed Assessment Report",
"Remediation Roadmap",
],
}, },
{ {
id: "pentest", id: "pentest", badge: "Full Penetration Test", badgeIcon: Target,
badge: "Full Penetration Test", price: "Custom Pricing", subtitle:
badgeIcon: Target, "Enterprise-grade comprehensive testing with detailed exploitation analysis", buttons: [
price: "Custom Pricing",
subtitle:
"Enterprise-grade comprehensive testing with detailed exploitation analysis",
buttons: [
{ text: "Request Quote", href: "/contact" }, { text: "Request Quote", href: "/contact" },
{ text: "Learn More", href: "#" }, { text: "Learn More", href: "#" },
], ],
features: [ features: [
"Multi-Phase Attack Simulation", "Multi-Phase Attack Simulation", "Network & Application Testing", "Credential Compromise Scenarios", "Post-Exploitation Analysis", "Executive Summary + Technical Report", "Remediation Consultation"],
"Network & Application Testing",
"Credential Compromise Scenarios",
"Post-Exploitation Analysis",
"Executive Summary + Technical Report",
"Remediation Consultation",
],
}, },
{ {
id: "elite", id: "elite", badge: "Elite Membership", badgeIcon: Crown,
badge: "Elite Membership", price: "$299/mo", subtitle:
badgeIcon: Crown, "Exclusive access to advanced training, community, and weekly intelligence briefings", buttons: [
price: "$299/mo",
subtitle:
"Exclusive access to advanced training, community, and weekly intelligence briefings",
buttons: [
{ text: "Join Elite", href: "#" }, { text: "Join Elite", href: "#" },
{ text: "30-Day Free Trial", href: "#" }, { text: "30-Day Free Trial", href: "#" },
], ],
features: [ features: [
"Advanced Security Courses", "Trusted by 500+ Security Professionals", "Advanced Security Courses", "Private Exploit Intelligence", "Weekly Deep-Dive Briefings", "Exclusive Community Access", "1-on-1 Expert Consultation", "CVE Research & Analysis Library"],
"Private Exploit Intelligence",
"Weekly Deep-Dive Briefings",
"Exclusive Community Access",
"1-on-1 Expert Consultation",
"CVE Research & Analysis Library",
],
}, },
{ {
id: "course", id: "course", badge: "Professional Courses", badgeIcon: BookOpen,
badge: "Professional Courses", price: "$99-$499", subtitle:
badgeIcon: BookOpen, "Self-paced advanced security education with hands-on labs and certifications", buttons: [
price: "$99-$499",
subtitle:
"Self-paced advanced security education with hands-on labs and certifications",
buttons: [
{ text: "Browse Courses", href: "#" }, { text: "Browse Courses", href: "#" },
{ text: "View Schedule", href: "#" }, { text: "View Schedule", href: "#" },
], ],
features: [ features: [
"Real-World CVE Studies", "Real-World CVE Studies", "Hands-On Lab Environments", "Advanced TTP Techniques", "Community Support", "Certificate of Completion", "Lifetime Access to Course Materials"],
"Hands-On Lab Environments",
"Advanced TTP Techniques",
"Community Support",
"Certificate of Completion",
"Lifetime Access to Course Materials",
],
}, },
]} ]}
animationType="slide-up" animationType="slide-up"
@@ -248,23 +185,9 @@ export default function HomePage() {
textboxLayout="default" textboxLayout="default"
useInvertedBackground={false} useInvertedBackground={false}
names={[ names={[
"Fortune 500 Enterprises", "Fortune 500 Enterprises", "Government Agencies", "Financial Institutions", "Healthcare Organizations", "Technology Companies", "Defense Contractors"]}
"Government Agencies",
"Financial Institutions",
"Healthcare Organizations",
"Technology Companies",
"Defense Contractors",
]}
logos={[ logos={[
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png"]}
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png",
]}
speed={40} speed={40}
showCard={true} showCard={true}
/> />
@@ -274,47 +197,23 @@ export default function HomePage() {
<TestimonialCardTwelve <TestimonialCardTwelve
testimonials={[ testimonials={[
{ {
id: "1", id: "1", name: "Michael Rodriguez", imageSrc:
name: "Michael Rodriguez", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png", imageAlt: "Michael Rodriguez, CISO"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png",
imageAlt: "Michael Rodriguez, CISO",
},
{ {
id: "2", id: "2", name: "Jennifer Lee", imageSrc:
name: "Jennifer Lee", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png", imageAlt: "Jennifer Lee, Security Director"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png",
imageAlt: "Jennifer Lee, Security Director",
},
{ {
id: "3", id: "3", name: "David Kim", imageSrc:
name: "David Kim", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png", imageAlt: "David Kim, Security Consultant"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png",
imageAlt: "David Kim, Security Consultant",
},
{ {
id: "4", id: "4", name: "Rebecca Patel", imageSrc:
name: "Rebecca Patel", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png", imageAlt: "Rebecca Patel, Red Team Lead"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png",
imageAlt: "Rebecca Patel, Red Team Lead",
},
{ {
id: "5", id: "5", name: "Thomas Anderson", imageSrc:
name: "Thomas Anderson", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png", imageAlt: "Thomas Anderson, Security Manager"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png",
imageAlt: "Thomas Anderson, Security Manager",
},
{ {
id: "6", id: "6", name: "Victoria Chen", imageSrc:
name: "Victoria Chen", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png", imageAlt: "Victoria Chen, CISO"},
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png",
imageAlt: "Victoria Chen, CISO",
},
]} ]}
cardTitle="Trusted by 2,500+ Security Professionals and 200+ Enterprise Organizations Worldwide" cardTitle="Trusted by 2,500+ Security Professionals and 200+ Enterprise Organizations Worldwide"
cardTag="Industry Leaders in Offensive Security" cardTag="Industry Leaders in Offensive Security"
@@ -327,8 +226,7 @@ export default function HomePage() {
<FooterBaseReveal <FooterBaseReveal
columns={[ columns={[
{ {
title: "Solutions", title: "Solutions", items: [
items: [
{ label: "Penetration Testing", href: "/services" }, { label: "Penetration Testing", href: "/services" },
{ label: "Vulnerability Assessment", href: "/services" }, { label: "Vulnerability Assessment", href: "/services" },
{ label: "Red Team Services", href: "/services" }, { label: "Red Team Services", href: "/services" },
@@ -336,8 +234,7 @@ export default function HomePage() {
], ],
}, },
{ {
title: "Training & Community", title: "Training & Community", items: [
items: [
{ label: "Security Courses", href: "/training" }, { label: "Security Courses", href: "/training" },
{ label: "Elite Membership", href: "#pricing" }, { label: "Elite Membership", href: "#pricing" },
{ label: "Community Forum", href: "#" }, { label: "Community Forum", href: "#" },
@@ -345,8 +242,7 @@ export default function HomePage() {
], ],
}, },
{ {
title: "Company", title: "Company", items: [
items: [
{ label: "About BHEH", href: "#" }, { label: "About BHEH", href: "#" },
{ label: "Blog & Research", href: "#" }, { label: "Blog & Research", href: "#" },
{ label: "Contact", href: "/contact" }, { label: "Contact", href: "/contact" },
@@ -359,4 +255,4 @@ export default function HomePage() {
</div> </div>
</ThemeProvider> </ThemeProvider>
); );
} }

View File

@@ -10,15 +10,15 @@
--accent: #ffffff; --accent: #ffffff;
--background-accent: #ffffff; */ --background-accent: #ffffff; */
--background: #efebe5; --background: #ffffff;
--card: #f7f2ea; --card: #f9f9f9;
--foreground: #000000; --foreground: #000f06e6;
--primary-cta: #000000; --primary-cta: #0a7039;
--primary-cta-text: #efebe5; --primary-cta-text: #ffffff;
--secondary-cta: #ffffff; --secondary-cta: #f9f9f9;
--secondary-cta-text: #000000; --secondary-cta-text: #000f06e6;
--accent: #ffffff; --accent: #e2e2e2;
--background-accent: #e1b875; --background-accent: #c4c4c4;
/* text sizing - set by ThemeProvider */ /* text sizing - set by ThemeProvider */
/* --text-2xs: clamp(0.465rem, 0.62vw, 0.62rem); /* --text-2xs: clamp(0.465rem, 0.62vw, 0.62rem);