Merge version_1 into main #4

Merged
bender merged 1 commits from version_1 into main 2026-03-27 05:32:17 +00:00

View File

@@ -44,12 +44,12 @@ export default function LandingPage() {
title="Kali Linux: The Ultimate OS for Penetration Testing"
description="Advanced penetration testing distribution for security researchers, analysts, and developers."
carouselItems={[
{ id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png" },
{ id: "1", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=1" },
{ id: "2", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=2" },
{ id: "3", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=3" },
{ id: "4", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=4" },
{ id: "5", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=5" },
{ id: "6", imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=6" },
]}
tag="Next-Gen Security"
tagIcon={ShieldCheck}
@@ -71,16 +71,16 @@ export default function LandingPage() {
useInvertedBackground={true}
features={[
{
id: 1, title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png" }
id: 1, title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=1" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=2" }
},
{
id: 2, title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png" }
id: 2, title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=1" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=2" }
},
{
id: 3, title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png" }
id: 3, title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=1" },
phoneTwo: { imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=2" }
}
]}
showStepNumbers={true}