diff --git a/src/app/page.tsx b/src/app/page.tsx
index fb9c450..3aab750 100644
--- a/src/app/page.tsx
+++ b/src/app/page.tsx
@@ -30,65 +30,31 @@ export default function LandingPage() {
@@ -100,18 +66,9 @@ export default function LandingPage() {
title="About Me"
description="With a passion for offensive and defensive security, I bridge the gap between complex vulnerabilities and actionable defense. My journey is driven by deep curiosity and an ethical drive to protect digital systems."
metrics={[
- {
- value: "50+",
- title: "Vulnerabilities Found",
- },
- {
- value: "10+",
- title: "Certifications",
- },
- {
- value: "100%",
- title: "Commitment to Ethics",
- },
+ { value: "50+", title: "Vulnerabilities Found" },
+ { value: "10+", title: "Certifications" },
+ { value: "100%", title: "Commitment to Ethics" }
]}
imageSrc="http://img.b2bpic.net/free-photo/man-solar-panels-plant-using-laptop-improve-solar-cells-efficiency_482257-119894.jpg"
imageAlt="portrait cybersecurity expert"
@@ -126,30 +83,9 @@ export default function LandingPage() {
textboxLayout="split"
useInvertedBackground={false}
features={[
- {
- id: "s1",
- title: "Offensive Security",
- description: "Penetration testing, bug hunting, and exploit development.",
- tag: "Red Team",
- imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg",
- imageAlt: "hacker terminal interface",
- },
- {
- id: "s2",
- title: "Defensive Security",
- description: "SIEM, threat monitoring, and incident response planning.",
- tag: "Blue Team",
- imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=2",
- imageAlt: "hacker terminal interface",
- },
- {
- id: "s3",
- title: "Security Tooling",
- description: "Burp Suite, Wireshark, Nmap, and automation tools.",
- tag: "Tooling",
- imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2",
- imageAlt: "hacker terminal interface",
- },
+ { id: "s1", title: "Offensive Security", description: "Penetration testing, bug hunting, and exploit development.", tag: "Red Team", imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", imageAlt: "hacker terminal interface" },
+ { id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "hacker terminal interface" },
+ { id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "hacker terminal interface" }
]}
title="My Expertise"
description="A comprehensive toolkit for securing systems and testing their limits."
@@ -163,51 +99,11 @@ export default function LandingPage() {
gridVariant="asymmetric-60-wide-40-narrow"
useInvertedBackground={true}
products={[
- {
- id: "p1",
- brand: "Web Exploit",
- name: "Vulnerability Scanner",
- price: "Tools: Python, OWASP",
- rating: 5,
- reviewCount: "12",
- imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg",
- },
- {
- id: "p2",
- brand: "Cryptography",
- name: "Password Cracker",
- price: "Tools: Hashcat, Python",
- rating: 5,
- reviewCount: "8",
- imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg",
- },
- {
- id: "p3",
- brand: "Simulation",
- name: "Phishing Lab",
- price: "Tools: Gophish, OSINT",
- rating: 5,
- reviewCount: "21",
- imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg",
- },
- {
- id: "p4",
- brand: "Web Exploit",
- name: "Scanner-2",
- price: "Tools: Python, OWASP",
- rating: 5,
- reviewCount: "5",
- imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg",
- },
- {
- id: "p5",
- brand: "Cryptography",
- name: "Cracker-2",
- price: "Tools: Hashcat, Python",
- rating: 5,
- reviewCount: "10",
- imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg",
- },
+ { id: "p1", brand: "Web Exploit", name: "Vulnerability Scanner", price: "Tools: Python, OWASP", rating: 5, reviewCount: "12", imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg" },
+ { id: "p2", brand: "Cryptography", name: "Password Cracker", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "8", imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg" },
+ { id: "p3", brand: "Simulation", name: "Phishing Lab", price: "Tools: Gophish, OSINT", rating: 5, reviewCount: "21", imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg" },
+ { id: "p4", brand: "Web Exploit", name: "Scanner-2", price: "Tools: Python, OWASP", rating: 5, reviewCount: "5", imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg" },
+ { id: "p5", brand: "Cryptography", name: "Cracker-2", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "10", imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg" }
]}
title="Featured Projects"
description="Selected projects and proof-of-concepts highlighting my technical security capabilities."
@@ -220,33 +116,9 @@ export default function LandingPage() {
textboxLayout="split"
useInvertedBackground={false}
metrics={[
- {
- id: "c1",
- value: "eJPT",
- title: "Offensive Security",
- items: [
- "Certified",
- "Active",
- ],
- },
- {
- id: "c2",
- value: "Security+",
- title: "CompTIA",
- items: [
- "Certified",
- "Global",
- ],
- },
- {
- id: "c3",
- value: "CEH",
- title: "Certified Hacker",
- items: [
- "Certified",
- "Industry",
- ],
- },
+ { id: "c1", value: "eJPT", title: "Offensive Security", items: ["Certified", "Active"] },
+ { id: "c2", value: "Security+", title: "CompTIA", items: ["Certified", "Global"] },
+ { id: "c3", value: "CEH", title: "Certified Hacker", items: ["Certified", "Industry"] }
]}
title="Certifications & Ranks"
description="Validated expertise and competitive engagement."
@@ -261,36 +133,9 @@ export default function LandingPage() {
title="Latest Writeups"
description="Tutorials, exploit analyses, and CTF walkthroughs from my research."
blogs={[
- {
- id: "b1",
- category: "Writeup",
- title: "Solving the XYZ CTF",
- excerpt: "How to bypass filters and get root.",
- imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg",
- authorName: "Me",
- authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg",
- date: "Oct 2023",
- },
- {
- id: "b2",
- category: "Analysis",
- title: "Phishing Tactics",
- excerpt: "Deep dive into modern phishing.",
- imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg",
- authorName: "Me",
- authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg",
- date: "Sep 2023",
- },
- {
- id: "b3",
- category: "Tool",
- title: "Automation with Bash",
- excerpt: "Efficiency in recon workflows.",
- imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg",
- authorName: "Me",
- authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg",
- date: "Aug 2023",
- },
+ { id: "b1", category: "Writeup", title: "Solving the XYZ CTF", excerpt: "How to bypass filters and get root.", imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg", date: "Oct 2023" },
+ { id: "b2", category: "Analysis", title: "Phishing Tactics", excerpt: "Deep dive into modern phishing.", imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg", date: "Sep 2023" },
+ { id: "b3", category: "Tool", title: "Automation with Bash", excerpt: "Efficiency in recon workflows.", imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg", date: "Aug 2023" }
]}
/>
@@ -298,21 +143,13 @@ export default function LandingPage() {
@@ -321,32 +158,8 @@ export default function LandingPage() {