From f30c3bab378123a7210a28255df0a153d77a4028 Mon Sep 17 00:00:00 2001 From: bender Date: Fri, 24 Apr 2026 13:34:18 +0000 Subject: [PATCH] Update src/app/page.tsx --- src/app/page.tsx | 257 +++++++---------------------------------------- 1 file changed, 35 insertions(+), 222 deletions(-) diff --git a/src/app/page.tsx b/src/app/page.tsx index fb9c450..3aab750 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -30,65 +30,31 @@ export default function LandingPage() {
@@ -100,18 +66,9 @@ export default function LandingPage() { title="About Me" description="With a passion for offensive and defensive security, I bridge the gap between complex vulnerabilities and actionable defense. My journey is driven by deep curiosity and an ethical drive to protect digital systems." metrics={[ - { - value: "50+", - title: "Vulnerabilities Found", - }, - { - value: "10+", - title: "Certifications", - }, - { - value: "100%", - title: "Commitment to Ethics", - }, + { value: "50+", title: "Vulnerabilities Found" }, + { value: "10+", title: "Certifications" }, + { value: "100%", title: "Commitment to Ethics" } ]} imageSrc="http://img.b2bpic.net/free-photo/man-solar-panels-plant-using-laptop-improve-solar-cells-efficiency_482257-119894.jpg" imageAlt="portrait cybersecurity expert" @@ -126,30 +83,9 @@ export default function LandingPage() { textboxLayout="split" useInvertedBackground={false} features={[ - { - id: "s1", - title: "Offensive Security", - description: "Penetration testing, bug hunting, and exploit development.", - tag: "Red Team", - imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", - imageAlt: "hacker terminal interface", - }, - { - id: "s2", - title: "Defensive Security", - description: "SIEM, threat monitoring, and incident response planning.", - tag: "Blue Team", - imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=2", - imageAlt: "hacker terminal interface", - }, - { - id: "s3", - title: "Security Tooling", - description: "Burp Suite, Wireshark, Nmap, and automation tools.", - tag: "Tooling", - imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2", - imageAlt: "hacker terminal interface", - }, + { id: "s1", title: "Offensive Security", description: "Penetration testing, bug hunting, and exploit development.", tag: "Red Team", imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", imageAlt: "hacker terminal interface" }, + { id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "hacker terminal interface" }, + { id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "hacker terminal interface" } ]} title="My Expertise" description="A comprehensive toolkit for securing systems and testing their limits." @@ -163,51 +99,11 @@ export default function LandingPage() { gridVariant="asymmetric-60-wide-40-narrow" useInvertedBackground={true} products={[ - { - id: "p1", - brand: "Web Exploit", - name: "Vulnerability Scanner", - price: "Tools: Python, OWASP", - rating: 5, - reviewCount: "12", - imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg", - }, - { - id: "p2", - brand: "Cryptography", - name: "Password Cracker", - price: "Tools: Hashcat, Python", - rating: 5, - reviewCount: "8", - imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg", - }, - { - id: "p3", - brand: "Simulation", - name: "Phishing Lab", - price: "Tools: Gophish, OSINT", - rating: 5, - reviewCount: "21", - imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg", - }, - { - id: "p4", - brand: "Web Exploit", - name: "Scanner-2", - price: "Tools: Python, OWASP", - rating: 5, - reviewCount: "5", - imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg", - }, - { - id: "p5", - brand: "Cryptography", - name: "Cracker-2", - price: "Tools: Hashcat, Python", - rating: 5, - reviewCount: "10", - imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg", - }, + { id: "p1", brand: "Web Exploit", name: "Vulnerability Scanner", price: "Tools: Python, OWASP", rating: 5, reviewCount: "12", imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg" }, + { id: "p2", brand: "Cryptography", name: "Password Cracker", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "8", imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg" }, + { id: "p3", brand: "Simulation", name: "Phishing Lab", price: "Tools: Gophish, OSINT", rating: 5, reviewCount: "21", imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg" }, + { id: "p4", brand: "Web Exploit", name: "Scanner-2", price: "Tools: Python, OWASP", rating: 5, reviewCount: "5", imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg" }, + { id: "p5", brand: "Cryptography", name: "Cracker-2", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "10", imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg" } ]} title="Featured Projects" description="Selected projects and proof-of-concepts highlighting my technical security capabilities." @@ -220,33 +116,9 @@ export default function LandingPage() { textboxLayout="split" useInvertedBackground={false} metrics={[ - { - id: "c1", - value: "eJPT", - title: "Offensive Security", - items: [ - "Certified", - "Active", - ], - }, - { - id: "c2", - value: "Security+", - title: "CompTIA", - items: [ - "Certified", - "Global", - ], - }, - { - id: "c3", - value: "CEH", - title: "Certified Hacker", - items: [ - "Certified", - "Industry", - ], - }, + { id: "c1", value: "eJPT", title: "Offensive Security", items: ["Certified", "Active"] }, + { id: "c2", value: "Security+", title: "CompTIA", items: ["Certified", "Global"] }, + { id: "c3", value: "CEH", title: "Certified Hacker", items: ["Certified", "Industry"] } ]} title="Certifications & Ranks" description="Validated expertise and competitive engagement." @@ -261,36 +133,9 @@ export default function LandingPage() { title="Latest Writeups" description="Tutorials, exploit analyses, and CTF walkthroughs from my research." blogs={[ - { - id: "b1", - category: "Writeup", - title: "Solving the XYZ CTF", - excerpt: "How to bypass filters and get root.", - imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg", - authorName: "Me", - authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg", - date: "Oct 2023", - }, - { - id: "b2", - category: "Analysis", - title: "Phishing Tactics", - excerpt: "Deep dive into modern phishing.", - imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg", - authorName: "Me", - authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg", - date: "Sep 2023", - }, - { - id: "b3", - category: "Tool", - title: "Automation with Bash", - excerpt: "Efficiency in recon workflows.", - imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg", - authorName: "Me", - authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg", - date: "Aug 2023", - }, + { id: "b1", category: "Writeup", title: "Solving the XYZ CTF", excerpt: "How to bypass filters and get root.", imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg", date: "Oct 2023" }, + { id: "b2", category: "Analysis", title: "Phishing Tactics", excerpt: "Deep dive into modern phishing.", imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg", date: "Sep 2023" }, + { id: "b3", category: "Tool", title: "Automation with Bash", excerpt: "Efficiency in recon workflows.", imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg", date: "Aug 2023" } ]} />
@@ -298,21 +143,13 @@ export default function LandingPage() {
@@ -321,32 +158,8 @@ export default function LandingPage() { -- 2.49.1