Merge version_1 into main #2
257
src/app/page.tsx
257
src/app/page.tsx
@@ -30,65 +30,31 @@ export default function LandingPage() {
|
||||
<div id="nav" data-section="nav">
|
||||
<NavbarLayoutFloatingInline
|
||||
navItems={[
|
||||
{
|
||||
name: "Home",
|
||||
id: "hero",
|
||||
},
|
||||
{
|
||||
name: "About",
|
||||
id: "about",
|
||||
},
|
||||
{
|
||||
name: "Projects",
|
||||
id: "projects",
|
||||
},
|
||||
{
|
||||
name: "Contact",
|
||||
id: "contact",
|
||||
},
|
||||
{ name: "Home", id: "hero" },
|
||||
{ name: "About", id: "about" },
|
||||
{ name: "Projects", id: "projects" },
|
||||
{ name: "Contact", id: "contact" }
|
||||
]}
|
||||
brandName="CyberSecPortfolio"
|
||||
button={{ text: "Get Started", href: "#contact" }}
|
||||
/>
|
||||
</div>
|
||||
|
||||
<div id="hero" data-section="hero">
|
||||
<HeroBillboardGallery
|
||||
background={{
|
||||
variant: "sparkles-gradient",
|
||||
}}
|
||||
background={{ variant: "sparkles-gradient" }}
|
||||
title="Securing the Digital Frontier"
|
||||
description="Cybersecurity Analyst & Ethical Hacker. Focused on identifying vulnerabilities before they become threats."
|
||||
buttons={[
|
||||
{
|
||||
text: "View Projects",
|
||||
href: "#projects",
|
||||
},
|
||||
{
|
||||
text: "Contact Me",
|
||||
href: "#contact",
|
||||
},
|
||||
{ text: "View Projects", href: "#projects" },
|
||||
{ text: "Contact Me", href: "#contact" }
|
||||
]}
|
||||
mediaItems={[
|
||||
{
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=1",
|
||||
imageAlt: "cybersecurity background tech",
|
||||
},
|
||||
{
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1",
|
||||
imageAlt: "firewall digital security",
|
||||
},
|
||||
{
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-presenting-invisible-hologram-projecting-from-tablet-advanced-technology_53876-105191.jpg",
|
||||
imageAlt: "hacker terminal interface",
|
||||
},
|
||||
{
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-dots-lines-connected_1048-11946.jpg",
|
||||
imageAlt: "cybersecurity background tech",
|
||||
},
|
||||
{
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637763.jpg",
|
||||
imageAlt: "firewall digital security",
|
||||
},
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "cybersecurity background tech" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "firewall digital security" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/businessman-presenting-invisible-hologram-projecting-from-tablet-advanced-technology_53876-105191.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-dots-lines-connected_1048-11946.jpg", imageAlt: "cybersecurity background tech" },
|
||||
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637763.jpg", imageAlt: "firewall digital security" }
|
||||
]}
|
||||
mediaAnimation="slide-up"
|
||||
/>
|
||||
@@ -100,18 +66,9 @@ export default function LandingPage() {
|
||||
title="About Me"
|
||||
description="With a passion for offensive and defensive security, I bridge the gap between complex vulnerabilities and actionable defense. My journey is driven by deep curiosity and an ethical drive to protect digital systems."
|
||||
metrics={[
|
||||
{
|
||||
value: "50+",
|
||||
title: "Vulnerabilities Found",
|
||||
},
|
||||
{
|
||||
value: "10+",
|
||||
title: "Certifications",
|
||||
},
|
||||
{
|
||||
value: "100%",
|
||||
title: "Commitment to Ethics",
|
||||
},
|
||||
{ value: "50+", title: "Vulnerabilities Found" },
|
||||
{ value: "10+", title: "Certifications" },
|
||||
{ value: "100%", title: "Commitment to Ethics" }
|
||||
]}
|
||||
imageSrc="http://img.b2bpic.net/free-photo/man-solar-panels-plant-using-laptop-improve-solar-cells-efficiency_482257-119894.jpg"
|
||||
imageAlt="portrait cybersecurity expert"
|
||||
@@ -126,30 +83,9 @@ export default function LandingPage() {
|
||||
textboxLayout="split"
|
||||
useInvertedBackground={false}
|
||||
features={[
|
||||
{
|
||||
id: "s1",
|
||||
title: "Offensive Security",
|
||||
description: "Penetration testing, bug hunting, and exploit development.",
|
||||
tag: "Red Team",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg",
|
||||
imageAlt: "hacker terminal interface",
|
||||
},
|
||||
{
|
||||
id: "s2",
|
||||
title: "Defensive Security",
|
||||
description: "SIEM, threat monitoring, and incident response planning.",
|
||||
tag: "Blue Team",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=2",
|
||||
imageAlt: "hacker terminal interface",
|
||||
},
|
||||
{
|
||||
id: "s3",
|
||||
title: "Security Tooling",
|
||||
description: "Burp Suite, Wireshark, Nmap, and automation tools.",
|
||||
tag: "Tooling",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2",
|
||||
imageAlt: "hacker terminal interface",
|
||||
},
|
||||
{ id: "s1", title: "Offensive Security", description: "Penetration testing, bug hunting, and exploit development.", tag: "Red Team", imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "hacker terminal interface" },
|
||||
{ id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "hacker terminal interface" }
|
||||
]}
|
||||
title="My Expertise"
|
||||
description="A comprehensive toolkit for securing systems and testing their limits."
|
||||
@@ -163,51 +99,11 @@ export default function LandingPage() {
|
||||
gridVariant="asymmetric-60-wide-40-narrow"
|
||||
useInvertedBackground={true}
|
||||
products={[
|
||||
{
|
||||
id: "p1",
|
||||
brand: "Web Exploit",
|
||||
name: "Vulnerability Scanner",
|
||||
price: "Tools: Python, OWASP",
|
||||
rating: 5,
|
||||
reviewCount: "12",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg",
|
||||
},
|
||||
{
|
||||
id: "p2",
|
||||
brand: "Cryptography",
|
||||
name: "Password Cracker",
|
||||
price: "Tools: Hashcat, Python",
|
||||
rating: 5,
|
||||
reviewCount: "8",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg",
|
||||
},
|
||||
{
|
||||
id: "p3",
|
||||
brand: "Simulation",
|
||||
name: "Phishing Lab",
|
||||
price: "Tools: Gophish, OSINT",
|
||||
rating: 5,
|
||||
reviewCount: "21",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg",
|
||||
},
|
||||
{
|
||||
id: "p4",
|
||||
brand: "Web Exploit",
|
||||
name: "Scanner-2",
|
||||
price: "Tools: Python, OWASP",
|
||||
rating: 5,
|
||||
reviewCount: "5",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg",
|
||||
},
|
||||
{
|
||||
id: "p5",
|
||||
brand: "Cryptography",
|
||||
name: "Cracker-2",
|
||||
price: "Tools: Hashcat, Python",
|
||||
rating: 5,
|
||||
reviewCount: "10",
|
||||
imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg",
|
||||
},
|
||||
{ id: "p1", brand: "Web Exploit", name: "Vulnerability Scanner", price: "Tools: Python, OWASP", rating: 5, reviewCount: "12", imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg" },
|
||||
{ id: "p2", brand: "Cryptography", name: "Password Cracker", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "8", imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg" },
|
||||
{ id: "p3", brand: "Simulation", name: "Phishing Lab", price: "Tools: Gophish, OSINT", rating: 5, reviewCount: "21", imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg" },
|
||||
{ id: "p4", brand: "Web Exploit", name: "Scanner-2", price: "Tools: Python, OWASP", rating: 5, reviewCount: "5", imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg" },
|
||||
{ id: "p5", brand: "Cryptography", name: "Cracker-2", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "10", imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg" }
|
||||
]}
|
||||
title="Featured Projects"
|
||||
description="Selected projects and proof-of-concepts highlighting my technical security capabilities."
|
||||
@@ -220,33 +116,9 @@ export default function LandingPage() {
|
||||
textboxLayout="split"
|
||||
useInvertedBackground={false}
|
||||
metrics={[
|
||||
{
|
||||
id: "c1",
|
||||
value: "eJPT",
|
||||
title: "Offensive Security",
|
||||
items: [
|
||||
"Certified",
|
||||
"Active",
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "c2",
|
||||
value: "Security+",
|
||||
title: "CompTIA",
|
||||
items: [
|
||||
"Certified",
|
||||
"Global",
|
||||
],
|
||||
},
|
||||
{
|
||||
id: "c3",
|
||||
value: "CEH",
|
||||
title: "Certified Hacker",
|
||||
items: [
|
||||
"Certified",
|
||||
"Industry",
|
||||
],
|
||||
},
|
||||
{ id: "c1", value: "eJPT", title: "Offensive Security", items: ["Certified", "Active"] },
|
||||
{ id: "c2", value: "Security+", title: "CompTIA", items: ["Certified", "Global"] },
|
||||
{ id: "c3", value: "CEH", title: "Certified Hacker", items: ["Certified", "Industry"] }
|
||||
]}
|
||||
title="Certifications & Ranks"
|
||||
description="Validated expertise and competitive engagement."
|
||||
@@ -261,36 +133,9 @@ export default function LandingPage() {
|
||||
title="Latest Writeups"
|
||||
description="Tutorials, exploit analyses, and CTF walkthroughs from my research."
|
||||
blogs={[
|
||||
{
|
||||
id: "b1",
|
||||
category: "Writeup",
|
||||
title: "Solving the XYZ CTF",
|
||||
excerpt: "How to bypass filters and get root.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg",
|
||||
authorName: "Me",
|
||||
authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg",
|
||||
date: "Oct 2023",
|
||||
},
|
||||
{
|
||||
id: "b2",
|
||||
category: "Analysis",
|
||||
title: "Phishing Tactics",
|
||||
excerpt: "Deep dive into modern phishing.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg",
|
||||
authorName: "Me",
|
||||
authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg",
|
||||
date: "Sep 2023",
|
||||
},
|
||||
{
|
||||
id: "b3",
|
||||
category: "Tool",
|
||||
title: "Automation with Bash",
|
||||
excerpt: "Efficiency in recon workflows.",
|
||||
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg",
|
||||
authorName: "Me",
|
||||
authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg",
|
||||
date: "Aug 2023",
|
||||
},
|
||||
{ id: "b1", category: "Writeup", title: "Solving the XYZ CTF", excerpt: "How to bypass filters and get root.", imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg", date: "Oct 2023" },
|
||||
{ id: "b2", category: "Analysis", title: "Phishing Tactics", excerpt: "Deep dive into modern phishing.", imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg", date: "Sep 2023" },
|
||||
{ id: "b3", category: "Tool", title: "Automation with Bash", excerpt: "Efficiency in recon workflows.", imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg", date: "Aug 2023" }
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -298,21 +143,13 @@ export default function LandingPage() {
|
||||
<div id="contact" data-section="contact">
|
||||
<ContactCTA
|
||||
useInvertedBackground={false}
|
||||
background={{
|
||||
variant: "plain",
|
||||
}}
|
||||
background={{ variant: "plain" }}
|
||||
tag="Let's talk"
|
||||
title="Get in touch"
|
||||
description="Interested in working together or hiring? Reach out anytime."
|
||||
buttons={[
|
||||
{
|
||||
text: "Send Email",
|
||||
href: "mailto:sec@example.com",
|
||||
},
|
||||
{
|
||||
text: "GitHub Profile",
|
||||
href: "https://github.com",
|
||||
},
|
||||
{ text: "Send Email", href: "mailto:sec@example.com" },
|
||||
{ text: "GitHub Profile", href: "https://github.com" }
|
||||
]}
|
||||
/>
|
||||
</div>
|
||||
@@ -321,32 +158,8 @@ export default function LandingPage() {
|
||||
<FooterBaseReveal
|
||||
logoText="CyberSecPortfolio"
|
||||
columns={[
|
||||
{
|
||||
title: "Social",
|
||||
items: [
|
||||
{
|
||||
label: "LinkedIn",
|
||||
href: "#",
|
||||
},
|
||||
{
|
||||
label: "GitHub",
|
||||
href: "#",
|
||||
},
|
||||
],
|
||||
},
|
||||
{
|
||||
title: "Resources",
|
||||
items: [
|
||||
{
|
||||
label: "Blog",
|
||||
href: "#blog",
|
||||
},
|
||||
{
|
||||
label: "Privacy Policy",
|
||||
href: "#",
|
||||
},
|
||||
],
|
||||
},
|
||||
{ title: "Social", items: [{ label: "LinkedIn", href: "#" }, { label: "GitHub", href: "#" }] },
|
||||
{ title: "Resources", items: [{ label: "Blog", href: "#blog" }, { label: "Privacy Policy", href: "#" }] }
|
||||
]}
|
||||
copyrightText="© 2024 Cybersecurity Portfolio"
|
||||
/>
|
||||
|
||||
Reference in New Issue
Block a user