Update src/app/page.tsx
This commit is contained in:
359
src/app/page.tsx
359
src/app/page.tsx
@@ -26,249 +26,134 @@ export default function LandingPage() {
|
||||
headingFontWeight="bold"
|
||||
>
|
||||
<ReactLenis root>
|
||||
<div id="nav" data-section="nav">
|
||||
<NavbarLayoutFloatingInline
|
||||
navItems={[
|
||||
{
|
||||
name: "Features",
|
||||
id: "#features",
|
||||
},
|
||||
{
|
||||
name: "About",
|
||||
id: "#about",
|
||||
},
|
||||
{
|
||||
name: "Metrics",
|
||||
id: "#metrics",
|
||||
},
|
||||
]}
|
||||
brandName="Kali Linux"
|
||||
/>
|
||||
</div>
|
||||
<div id="nav" data-section="nav">
|
||||
<NavbarLayoutFloatingInline
|
||||
navItems={[
|
||||
{ name: "Features", id: "#features" },
|
||||
{ name: "About", id: "#about" },
|
||||
{ name: "Metrics", id: "#metrics" },
|
||||
]}
|
||||
brandName="Kali Linux"
|
||||
button={{ text: "Get Started", href: "#" }}
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="hero" data-section="hero">
|
||||
<HeroBillboardRotatedCarousel
|
||||
background={{
|
||||
variant: "rotated-rays-animated",
|
||||
}}
|
||||
title="Kali Linux: The Ultimate OS for Penetration Testing"
|
||||
description="Advanced penetration testing distribution for security researchers, analysts, and developers."
|
||||
carouselItems={[
|
||||
{
|
||||
id: "1",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=1",
|
||||
imageAlt: "Dashboard View 1",
|
||||
},
|
||||
{
|
||||
id: "2",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=2",
|
||||
imageAlt: "Dashboard View 2",
|
||||
},
|
||||
{
|
||||
id: "3",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=3",
|
||||
imageAlt: "Dashboard View 3",
|
||||
},
|
||||
{
|
||||
id: "4",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=4",
|
||||
imageAlt: "Dashboard View 4",
|
||||
},
|
||||
{
|
||||
id: "5",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=5",
|
||||
imageAlt: "Dashboard View 5",
|
||||
},
|
||||
{
|
||||
id: "6",
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=6",
|
||||
imageAlt: "Dashboard View 6",
|
||||
},
|
||||
]}
|
||||
tag="Next-Gen Security"
|
||||
tagIcon={ShieldCheck}
|
||||
tagAnimation="blur-reveal"
|
||||
buttons={[
|
||||
{
|
||||
text: "Download Kali",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
text: "Documentation",
|
||||
href: "#",
|
||||
},
|
||||
]}
|
||||
buttonAnimation="slide-up"
|
||||
autoPlay={true}
|
||||
autoPlayInterval={4000}
|
||||
/>
|
||||
</div>
|
||||
<div id="hero" data-section="hero">
|
||||
<HeroBillboardRotatedCarousel
|
||||
background={{ variant: "rotated-rays-animated" }}
|
||||
title="Kali Linux: The Ultimate OS for Penetration Testing"
|
||||
description="Advanced penetration testing distribution for security researchers, analysts, and developers."
|
||||
carouselItems={[
|
||||
{ id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
{ id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
{ id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
{ id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
{ id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
{ id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
|
||||
]}
|
||||
tag="Next-Gen Security"
|
||||
tagIcon={ShieldCheck}
|
||||
tagAnimation="blur-reveal"
|
||||
buttons={[
|
||||
{ text: "Download Kali", href: "#" },
|
||||
{ text: "Documentation", href: "#" },
|
||||
]}
|
||||
buttonAnimation="slide-up"
|
||||
autoPlay={true}
|
||||
autoPlayInterval={4000}
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="features" data-section="features">
|
||||
<FeatureCardNine
|
||||
textboxLayout="split"
|
||||
useInvertedBackground={true}
|
||||
features={[
|
||||
{
|
||||
id: 1,
|
||||
title: "Penetration Testing",
|
||||
description: "Comprehensive tools for exploitation and assessment.",
|
||||
phoneOne: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=1",
|
||||
},
|
||||
phoneTwo: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=2",
|
||||
},
|
||||
},
|
||||
{
|
||||
id: 2,
|
||||
title: "Vulnerability Analysis",
|
||||
description: "Deep scanning and identification of infrastructure gaps.",
|
||||
phoneOne: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=1",
|
||||
},
|
||||
phoneTwo: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=2",
|
||||
},
|
||||
},
|
||||
{
|
||||
id: 3,
|
||||
title: "Digital Forensics",
|
||||
description: "Analyze and recover critical digital evidence efficiently.",
|
||||
phoneOne: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=1",
|
||||
},
|
||||
phoneTwo: {
|
||||
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=2",
|
||||
},
|
||||
},
|
||||
]}
|
||||
showStepNumbers={true}
|
||||
title="Advanced Security Toolset"
|
||||
description="Kali Linux provides over 600 tools for testing, analysis, and discovery."
|
||||
tag="Toolkit Overview"
|
||||
tagIcon={Terminal}
|
||||
tagAnimation="blur-reveal"
|
||||
/>
|
||||
</div>
|
||||
<div id="features" data-section="features">
|
||||
<FeatureCardNine
|
||||
animationType="blur-reveal"
|
||||
textboxLayout="split"
|
||||
useInvertedBackground={true}
|
||||
features={[
|
||||
{
|
||||
id: 1, title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" },
|
||||
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" }
|
||||
},
|
||||
{
|
||||
id: 2, title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" },
|
||||
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" }
|
||||
},
|
||||
{
|
||||
id: 3, title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" },
|
||||
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" }
|
||||
}
|
||||
]}
|
||||
showStepNumbers={true}
|
||||
title="Advanced Security Toolset"
|
||||
description="Kali Linux provides over 600 tools for testing, analysis, and discovery."
|
||||
tag="Toolkit Overview"
|
||||
tagIcon={Terminal}
|
||||
tagAnimation="blur-reveal"
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="about" data-section="about">
|
||||
<TestimonialAboutCard
|
||||
useInvertedBackground={false}
|
||||
tag="Trusted Platform"
|
||||
title="Designed for Security Professionals"
|
||||
description="Kali Linux is built by Offensive Security, designed to support the entire lifecycle of a security engagement."
|
||||
subdescription="Whether you are a professional researcher or just starting out, our platform gives you the tools you need to succeed."
|
||||
icon={Shield}
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-sleek-modern-office-setup-showing-a-hi-1774589422147-04991ae8.png"
|
||||
mediaAnimation="slide-up"
|
||||
tagIcon={Shield}
|
||||
tagAnimation="slide-up"
|
||||
imageAlt="Professional workspace"
|
||||
/>
|
||||
</div>
|
||||
<div id="about" data-section="about">
|
||||
<TestimonialAboutCard
|
||||
tag="Trusted Platform"
|
||||
title="Designed for Security Professionals"
|
||||
description="Kali Linux is built by Offensive Security, designed to support the entire lifecycle of a security engagement."
|
||||
subdescription="Whether you are a professional researcher or just starting out, our platform gives you the tools you need to succeed."
|
||||
icon={Shield}
|
||||
imageSrc="https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-sleek-modern-office-setup-showing-a-hi-1774589422147-04991ae8.png"
|
||||
mediaAnimation="slide-up"
|
||||
tagIcon={Shield}
|
||||
tagAnimation="slide-up"
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="metrics" data-section="metrics">
|
||||
<MetricCardTwo
|
||||
animationType="depth-3d"
|
||||
textboxLayout="split"
|
||||
gridVariant="uniform-all-items-equal"
|
||||
useInvertedBackground={true}
|
||||
metrics={[
|
||||
{
|
||||
id: "m1",
|
||||
value: "600+",
|
||||
description: "Security Tools",
|
||||
},
|
||||
{
|
||||
id: "m2",
|
||||
value: "10M+",
|
||||
description: "Active Users",
|
||||
},
|
||||
{
|
||||
id: "m3",
|
||||
value: "15+",
|
||||
description: "Years of Innovation",
|
||||
},
|
||||
]}
|
||||
title="Market Leading Standard"
|
||||
description="Kali Linux is the gold standard for security professionals globally."
|
||||
tag="Our Impact"
|
||||
tagIcon={TrendingUp}
|
||||
/>
|
||||
</div>
|
||||
<div id="metrics" data-section="metrics">
|
||||
<MetricCardTwo
|
||||
animationType="depth-3d"
|
||||
textboxLayout="split"
|
||||
gridVariant="uniform-all-items-equal"
|
||||
useInvertedBackground={true}
|
||||
metrics={[
|
||||
{ id: "m1", value: "600+", description: "Security Tools" },
|
||||
{ id: "m2", value: "10M+", description: "Active Users" },
|
||||
{ id: "m3", value: "15+", description: "Years of Innovation" },
|
||||
]}
|
||||
title="Market Leading Standard"
|
||||
description="Kali Linux is the gold standard for security professionals globally."
|
||||
tag="Our Impact"
|
||||
tagIcon={TrendingUp}
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="testimonials" data-section="testimonials">
|
||||
<TestimonialCardFifteen
|
||||
useInvertedBackground={false}
|
||||
testimonial="The absolute benchmark for professional penetration testing. Nothing else comes close to the toolset and documentation provided by Kali Linux."
|
||||
rating={5}
|
||||
author="Marcus Thorne"
|
||||
avatars={[
|
||||
{
|
||||
src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-cyber-securit-1774589424368-5d02cb3f.png",
|
||||
alt: "User 1",
|
||||
},
|
||||
{
|
||||
src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-network-engin-1774589422089-252b5d63.png",
|
||||
alt: "User 2",
|
||||
},
|
||||
{
|
||||
src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-penetration-t-1774589422769-c12d18e8.png",
|
||||
alt: "User 3",
|
||||
},
|
||||
{
|
||||
src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-data-analyst--1774589422495-aa6e911f.png",
|
||||
alt: "User 4",
|
||||
},
|
||||
]}
|
||||
ratingAnimation="slide-up"
|
||||
avatarsAnimation="slide-up"
|
||||
/>
|
||||
</div>
|
||||
<div id="testimonials" data-section="testimonials">
|
||||
<TestimonialCardFifteen
|
||||
testimonial="The absolute benchmark for professional penetration testing. Nothing else comes close to the toolset and documentation provided by Kali Linux."
|
||||
rating={5}
|
||||
author="Marcus Thorne"
|
||||
avatars={[
|
||||
{ src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-cyber-securit-1774589424368-5d02cb3f.png", alt: "User 1" },
|
||||
{ src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-network-engin-1774589422089-252b5d63.png", alt: "User 2" },
|
||||
{ src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-penetration-t-1774589422769-c12d18e8.png", alt: "User 3" },
|
||||
{ src: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/professional-portrait-of-a-data-analyst--1774589422495-aa6e911f.png", alt: "User 4" },
|
||||
]}
|
||||
ratingAnimation="slide-up"
|
||||
avatarsAnimation="slide-up"
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="footer" data-section="footer">
|
||||
<FooterSimple
|
||||
columns={[
|
||||
{
|
||||
title: "Resources",
|
||||
items: [
|
||||
{
|
||||
label: "Docs",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
label: "Forum",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
label: "Blog",
|
||||
href: "#",
|
||||
},
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Company",
|
||||
items: [
|
||||
{
|
||||
label: "About Us",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
label: "Support",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
label: "Privacy",
|
||||
href: "#",
|
||||
},
|
||||
],
|
||||
},
|
||||
]}
|
||||
bottomLeftText="© 2024 Kali Linux"
|
||||
bottomRightText="Made by Pirmaxmatov"
|
||||
/>
|
||||
</div>
|
||||
<div id="footer" data-section="footer">
|
||||
<FooterSimple
|
||||
columns={[
|
||||
{
|
||||
title: "Resources", items: [{ label: "Docs", href: "#" }, { label: "Forum", href: "#" }, { label: "Blog", href: "#" }],
|
||||
},
|
||||
{
|
||||
title: "Company", items: [{ label: "About Us", href: "#" }, { label: "Support", href: "#" }, { label: "Privacy", href: "#" }],
|
||||
},
|
||||
]}
|
||||
bottomLeftText="© 2024 Kali Linux"
|
||||
bottomRightText="Made by Pirmaxmatov"
|
||||
/>
|
||||
</div>
|
||||
</ReactLenis>
|
||||
</ThemeProvider>
|
||||
);
|
||||
|
||||
Reference in New Issue
Block a user