3 Commits

Author SHA1 Message Date
a7ea20efb2 Update theme colors 2026-03-05 00:14:57 +00:00
479eae146d Update src/app/page.tsx 2026-03-04 23:04:44 +00:00
8882efd786 Update src/app/layout.tsx 2026-03-04 23:04:43 +00:00
3 changed files with 67 additions and 186 deletions

View File

@@ -7,48 +7,33 @@ import { ServiceWrapper } from "@/components/ServiceWrapper";
import Tag from "@/tag/Tag";
const halant = Halant({
variable: "--font-halant",
subsets: ["latin"],
variable: "--font-halant", subsets: ["latin"],
weight: ["300", "400", "500", "600", "700"],
});
const inter = Inter({
variable: "--font-inter",
subsets: ["latin"],
variable: "--font-inter", subsets: ["latin"],
});
const poppins = Poppins({
variable: "--font-poppins",
subsets: ["latin"],
variable: "--font-poppins", subsets: ["latin"],
weight: ["100", "200", "300", "400", "500", "600", "700", "800", "900"],
});
export const metadata: Metadata = {
title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training",
description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.",
keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity",
metadataBase: new URL("https://blackhatethicalhacking.com"),
title: "Black Hat Ethical Hacking - Expert Penetration Testing & Security Training", description: "BHEH provides professional penetration testing, vulnerability assessments, advanced security courses, and elite community access. Learn vulnerabilities before attackers do.", keywords: "penetration testing, ethical hacking, vulnerability assessment, security training, red team, offensive security, cybersecurity", metadataBase: new URL("https://blackhatethicalhacking.com"),
alternates: {
canonical: "https://blackhatethicalhacking.com"
},
openGraph: {
title: "Black Hat Ethical Hacking - Offensive Security Expertise",
description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.",
url: "https://blackhatethicalhacking.com",
siteName: "Black Hat Ethical Hacking",
type: "website",
images: [
title: "Black Hat Ethical Hacking - Offensive Security Expertise", description: "Expert penetration testing, vulnerability assessments, and advanced security training for enterprises and professionals.", url: "https://blackhatethicalhacking.com", siteName: "Black Hat Ethical Hacking", type: "website", images: [
{
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png",
alt: "Black Hat Ethical Hacking - Security Operations Center"
url: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", alt: "Black Hat Ethical Hacking - Security Operations Center"
}
]
},
twitter: {
card: "summary_large_image",
title: "Black Hat Ethical Hacking - Penetration Testing & Security Training",
description: "Learn vulnerabilities before attackers do. Expert offensive security services.",
images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
card: "summary_large_image", title: "Black Hat Ethical Hacking - Penetration Testing & Security Training", description: "Learn vulnerabilities before attackers do. Expert offensive security services.", images: ["https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png"]
},
robots: {
index: true,
@@ -1440,4 +1425,4 @@ export default function RootLayout({
</ServiceWrapper>
</html>
);
}
}

View File

@@ -48,9 +48,7 @@ export default function HomePage() {
{ name: "Resources", id: "resources" },
]}
button={{
text: "Explore Solutions",
href: "/services",
}}
text: "Explore Solutions", href: "/services"}}
animateOnLoad={true}
/>
</div>
@@ -66,21 +64,15 @@ export default function HomePage() {
slides={[
{
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png",
imageAlt:
"Security operations center with offensive security controls",
},
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/a-sleek-offensive-security-control-cente-1772665231308-cf2685f1.png", imageAlt:
"Security operations center with offensive security controls"},
{
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png",
imageAlt: "Network attack visualization and threat pathways",
},
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/abstract-digital-network-attack-visualiz-1772665231232-0dbf7641.png", imageAlt: "Network attack visualization and threat pathways"},
{
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png",
imageAlt:
"Red team operations and security assessments",
},
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-red-team-operatives-in-a-mo-1772665230961-f5b84058.png", imageAlt:
"Red team operations and security assessments"},
]}
autoplayDelay={4000}
showDimOverlay={true}
@@ -95,14 +87,10 @@ export default function HomePage() {
{ icon: Target, label: "Critical Tests Delivered", value: "500+" },
{
icon: Users,
label: "Security Professionals",
value: "2,500+",
},
label: "Security Professionals", value: "2,500+"},
{
icon: Globe,
label: "Enterprise Clients Secured",
value: "200+",
},
label: "Enterprise Clients Secured", value: "200+"},
]}
metricsAnimation="slide-up"
useInvertedBackground={false}
@@ -117,29 +105,17 @@ export default function HomePage() {
tagIcon={Zap}
features={[
{
title: "Penetration Testing Services",
description:
"Expert manual security assessments targeting real-world attack vectors and business-critical systems.",
bentoComponent: "globe",
},
title: "Penetration Testing Services", description:
"Expert manual security assessments targeting real-world attack vectors and business-critical systems.", bentoComponent: "globe"},
{
title: "Vulnerability Management",
description:
"Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.",
bentoComponent: "animated-bar-chart",
},
title: "Vulnerability Management", description:
"Comprehensive vulnerability discovery and prioritization with actionable remediation guidance.", bentoComponent: "animated-bar-chart"},
{
title: "Red Team Operations",
description:
"Advanced adversary simulations and multi-phase engagement scenarios.",
bentoComponent: "map",
},
title: "Red Team Operations", description:
"Advanced adversary simulations and multi-phase engagement scenarios.", bentoComponent: "map"},
{
title: "Exploit Development",
description:
"Zero-day research and advanced exploitation technique training.",
bentoComponent: "line-chart",
},
title: "Exploit Development", description:
"Zero-day research and advanced exploitation technique training.", bentoComponent: "line-chart"},
]}
textboxLayout="default"
animationType="slide-up"
@@ -155,83 +131,44 @@ export default function HomePage() {
tagIcon={DollarSign}
plans={[
{
id: "assessment",
badge: "Vulnerability Assessment",
badgeIcon: Search,
price: "Custom Pricing",
subtitle:
"Ideal for SMBs seeking foundational security insights",
buttons: [
id: "assessment", badge: "Vulnerability Assessment", badgeIcon: Search,
price: "Custom Pricing", subtitle:
"Ideal for SMBs seeking foundational security insights", buttons: [
{ text: "Request Quote", href: "/contact" },
{ text: "Learn More", href: "#" },
],
features: [
"Scope Definition & Reconnaissance",
"Active Vulnerability Scanning",
"Manual Testing of High-Risk Areas",
"Detailed Assessment Report",
"Remediation Roadmap",
],
"Scope Definition & Reconnaissance", "Active Vulnerability Scanning", "Manual Testing of High-Risk Areas", "Detailed Assessment Report", "Remediation Roadmap"],
},
{
id: "pentest",
badge: "Full Penetration Test",
badgeIcon: Target,
price: "Custom Pricing",
subtitle:
"Enterprise-grade comprehensive testing with detailed exploitation analysis",
buttons: [
id: "pentest", badge: "Full Penetration Test", badgeIcon: Target,
price: "Custom Pricing", subtitle:
"Enterprise-grade comprehensive testing with detailed exploitation analysis", buttons: [
{ text: "Request Quote", href: "/contact" },
{ text: "Learn More", href: "#" },
],
features: [
"Multi-Phase Attack Simulation",
"Network & Application Testing",
"Credential Compromise Scenarios",
"Post-Exploitation Analysis",
"Executive Summary + Technical Report",
"Remediation Consultation",
],
"Multi-Phase Attack Simulation", "Network & Application Testing", "Credential Compromise Scenarios", "Post-Exploitation Analysis", "Executive Summary + Technical Report", "Remediation Consultation"],
},
{
id: "elite",
badge: "Elite Membership",
badgeIcon: Crown,
price: "$299/mo",
subtitle:
"Exclusive access to advanced training, community, and weekly intelligence briefings",
buttons: [
id: "elite", badge: "Elite Membership", badgeIcon: Crown,
price: "$299/mo", subtitle:
"Exclusive access to advanced training, community, and weekly intelligence briefings", buttons: [
{ text: "Join Elite", href: "#" },
{ text: "30-Day Free Trial", href: "#" },
],
features: [
"Advanced Security Courses",
"Private Exploit Intelligence",
"Weekly Deep-Dive Briefings",
"Exclusive Community Access",
"1-on-1 Expert Consultation",
"CVE Research & Analysis Library",
],
"Trusted by 500+ Security Professionals", "Advanced Security Courses", "Private Exploit Intelligence", "Weekly Deep-Dive Briefings", "Exclusive Community Access", "1-on-1 Expert Consultation", "CVE Research & Analysis Library"],
},
{
id: "course",
badge: "Professional Courses",
badgeIcon: BookOpen,
price: "$99-$499",
subtitle:
"Self-paced advanced security education with hands-on labs and certifications",
buttons: [
id: "course", badge: "Professional Courses", badgeIcon: BookOpen,
price: "$99-$499", subtitle:
"Self-paced advanced security education with hands-on labs and certifications", buttons: [
{ text: "Browse Courses", href: "#" },
{ text: "View Schedule", href: "#" },
],
features: [
"Real-World CVE Studies",
"Hands-On Lab Environments",
"Advanced TTP Techniques",
"Community Support",
"Certificate of Completion",
"Lifetime Access to Course Materials",
],
"Real-World CVE Studies", "Hands-On Lab Environments", "Advanced TTP Techniques", "Community Support", "Certificate of Completion", "Lifetime Access to Course Materials"],
},
]}
animationType="slide-up"
@@ -248,23 +185,9 @@ export default function HomePage() {
textboxLayout="default"
useInvertedBackground={false}
names={[
"Fortune 500 Enterprises",
"Government Agencies",
"Financial Institutions",
"Healthcare Organizations",
"Technology Companies",
"Defense Contractors",
]}
"Fortune 500 Enterprises", "Government Agencies", "Financial Institutions", "Healthcare Organizations", "Technology Companies", "Defense Contractors"]}
logos={[
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png",
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png",
]}
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/microsoft-corporate-logo-in-professional-1772665230899-72ad699d.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/google-corporate-logo-in-professional-st-1772665229491-3cdaa423.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/amazon-corporate-logo-in-professional-st-1772665231165-9d534d99.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/cisco-corporate-logo-in-professional-sty-1772665230232-607a1c38.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/ibm-corporate-logo-in-professional-style-1772665229572-4fde208b.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/oracle-corporate-logo-in-professional-st-1772665230272-2e3bf981.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/vmware-corporate-logo-in-professional-st-1772665230936-471a9b59.png", "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/crowdstrike-corporate-logo-in-profession-1772665230593-feebe9c2.png"]}
speed={40}
showCard={true}
/>
@@ -274,47 +197,23 @@ export default function HomePage() {
<TestimonialCardTwelve
testimonials={[
{
id: "1",
name: "Michael Rodriguez",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png",
imageAlt: "Michael Rodriguez, CISO",
},
id: "1", name: "Michael Rodriguez", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-ciso-or-secur-1772665230699-34f24f43.png", imageAlt: "Michael Rodriguez, CISO"},
{
id: "2",
name: "Jennifer Lee",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png",
imageAlt: "Jennifer Lee, Security Director",
},
id: "2", name: "Jennifer Lee", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230258-822d603e.png", imageAlt: "Jennifer Lee, Security Director"},
{
id: "3",
name: "David Kim",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png",
imageAlt: "David Kim, Security Consultant",
},
id: "3", name: "David Kim", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-male-security-1772665230880-391c8105.png", imageAlt: "David Kim, Security Consultant"},
{
id: "4",
name: "Rebecca Patel",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png",
imageAlt: "Rebecca Patel, Red Team Lead",
},
id: "4", name: "Rebecca Patel", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-penetr-1772665230579-27fed186.png", imageAlt: "Rebecca Patel, Red Team Lead"},
{
id: "5",
name: "Thomas Anderson",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png",
imageAlt: "Thomas Anderson, Security Manager",
},
id: "5", name: "Thomas Anderson", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-security-oper-1772665230399-cd58b901.png", imageAlt: "Thomas Anderson, Security Manager"},
{
id: "6",
name: "Victoria Chen",
imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png",
imageAlt: "Victoria Chen, CISO",
},
id: "6", name: "Victoria Chen", imageSrc:
"https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3AV5zieBE9moM5TuLbdqDKSJv8O/professional-headshot-of-a-female-securi-1772665230542-1aed583e.png", imageAlt: "Victoria Chen, CISO"},
]}
cardTitle="Trusted by 2,500+ Security Professionals and 200+ Enterprise Organizations Worldwide"
cardTag="Industry Leaders in Offensive Security"
@@ -327,8 +226,7 @@ export default function HomePage() {
<FooterBaseReveal
columns={[
{
title: "Solutions",
items: [
title: "Solutions", items: [
{ label: "Penetration Testing", href: "/services" },
{ label: "Vulnerability Assessment", href: "/services" },
{ label: "Red Team Services", href: "/services" },
@@ -336,8 +234,7 @@ export default function HomePage() {
],
},
{
title: "Training & Community",
items: [
title: "Training & Community", items: [
{ label: "Security Courses", href: "/training" },
{ label: "Elite Membership", href: "#pricing" },
{ label: "Community Forum", href: "#" },
@@ -345,8 +242,7 @@ export default function HomePage() {
],
},
{
title: "Company",
items: [
title: "Company", items: [
{ label: "About BHEH", href: "#" },
{ label: "Blog & Research", href: "#" },
{ label: "Contact", href: "/contact" },
@@ -359,4 +255,4 @@ export default function HomePage() {
</div>
</ThemeProvider>
);
}
}

View File

@@ -10,15 +10,15 @@
--accent: #ffffff;
--background-accent: #ffffff; */
--background: #efebe5;
--card: #f7f2ea;
--foreground: #000000;
--primary-cta: #000000;
--primary-cta-text: #efebe5;
--secondary-cta: #ffffff;
--secondary-cta-text: #000000;
--accent: #ffffff;
--background-accent: #e1b875;
--background: #ffffff;
--card: #f9f9f9;
--foreground: #000f06e6;
--primary-cta: #0a7039;
--primary-cta-text: #ffffff;
--secondary-cta: #f9f9f9;
--secondary-cta-text: #000f06e6;
--accent: #e2e2e2;
--background-accent: #c4c4c4;
/* text sizing - set by ThemeProvider */
/* --text-2xs: clamp(0.465rem, 0.62vw, 0.62rem);