Merge version_1 into main #2

Merged
bender merged 1 commits from version_1 into main 2026-04-24 13:34:22 +00:00

View File

@@ -30,65 +30,31 @@ export default function LandingPage() {
<div id="nav" data-section="nav">
<NavbarLayoutFloatingInline
navItems={[
{
name: "Home",
id: "hero",
},
{
name: "About",
id: "about",
},
{
name: "Projects",
id: "projects",
},
{
name: "Contact",
id: "contact",
},
{ name: "Home", id: "hero" },
{ name: "About", id: "about" },
{ name: "Projects", id: "projects" },
{ name: "Contact", id: "contact" }
]}
brandName="CyberSecPortfolio"
button={{ text: "Get Started", href: "#contact" }}
/>
</div>
<div id="hero" data-section="hero">
<HeroBillboardGallery
background={{
variant: "sparkles-gradient",
}}
background={{ variant: "sparkles-gradient" }}
title="Securing the Digital Frontier"
description="Cybersecurity Analyst & Ethical Hacker. Focused on identifying vulnerabilities before they become threats."
buttons={[
{
text: "View Projects",
href: "#projects",
},
{
text: "Contact Me",
href: "#contact",
},
{ text: "View Projects", href: "#projects" },
{ text: "Contact Me", href: "#contact" }
]}
mediaItems={[
{
imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=1",
imageAlt: "cybersecurity background tech",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=1",
imageAlt: "firewall digital security",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/businessman-presenting-invisible-hologram-projecting-from-tablet-advanced-technology_53876-105191.jpg",
imageAlt: "hacker terminal interface",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-dots-lines-connected_1048-11946.jpg",
imageAlt: "cybersecurity background tech",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637763.jpg",
imageAlt: "firewall digital security",
},
{ imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "cybersecurity background tech" },
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "firewall digital security" },
{ imageSrc: "http://img.b2bpic.net/free-photo/businessman-presenting-invisible-hologram-projecting-from-tablet-advanced-technology_53876-105191.jpg", imageAlt: "hacker terminal interface" },
{ imageSrc: "http://img.b2bpic.net/free-photo/3d-abstract-dots-lines-connected_1048-11946.jpg", imageAlt: "cybersecurity background tech" },
{ imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637763.jpg", imageAlt: "firewall digital security" }
]}
mediaAnimation="slide-up"
/>
@@ -100,18 +66,9 @@ export default function LandingPage() {
title="About Me"
description="With a passion for offensive and defensive security, I bridge the gap between complex vulnerabilities and actionable defense. My journey is driven by deep curiosity and an ethical drive to protect digital systems."
metrics={[
{
value: "50+",
title: "Vulnerabilities Found",
},
{
value: "10+",
title: "Certifications",
},
{
value: "100%",
title: "Commitment to Ethics",
},
{ value: "50+", title: "Vulnerabilities Found" },
{ value: "10+", title: "Certifications" },
{ value: "100%", title: "Commitment to Ethics" }
]}
imageSrc="http://img.b2bpic.net/free-photo/man-solar-panels-plant-using-laptop-improve-solar-cells-efficiency_482257-119894.jpg"
imageAlt="portrait cybersecurity expert"
@@ -126,30 +83,9 @@ export default function LandingPage() {
textboxLayout="split"
useInvertedBackground={false}
features={[
{
id: "s1",
title: "Offensive Security",
description: "Penetration testing, bug hunting, and exploit development.",
tag: "Red Team",
imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg",
imageAlt: "hacker terminal interface",
},
{
id: "s2",
title: "Defensive Security",
description: "SIEM, threat monitoring, and incident response planning.",
tag: "Blue Team",
imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg?_wi=2",
imageAlt: "hacker terminal interface",
},
{
id: "s3",
title: "Security Tooling",
description: "Burp Suite, Wireshark, Nmap, and automation tools.",
tag: "Tooling",
imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg?_wi=2",
imageAlt: "hacker terminal interface",
},
{ id: "s1", title: "Offensive Security", description: "Penetration testing, bug hunting, and exploit development.", tag: "Red Team", imageSrc: "http://img.b2bpic.net/free-photo/data-center-technician-using-node-tree-software-mockup-pc-analyze-datasets_482257-126167.jpg", imageAlt: "hacker terminal interface" },
{ id: "s2", title: "Defensive Security", description: "SIEM, threat monitoring, and incident response planning.", tag: "Blue Team", imageSrc: "http://img.b2bpic.net/free-photo/pulsating-neon-lines-darkness-flow-light-art_169016-70235.jpg", imageAlt: "hacker terminal interface" },
{ id: "s3", title: "Security Tooling", description: "Burp Suite, Wireshark, Nmap, and automation tools.", tag: "Tooling", imageSrc: "http://img.b2bpic.net/free-photo/cyber-security-concept-digital-art_23-2151637784.jpg", imageAlt: "hacker terminal interface" }
]}
title="My Expertise"
description="A comprehensive toolkit for securing systems and testing their limits."
@@ -163,51 +99,11 @@ export default function LandingPage() {
gridVariant="asymmetric-60-wide-40-narrow"
useInvertedBackground={true}
products={[
{
id: "p1",
brand: "Web Exploit",
name: "Vulnerability Scanner",
price: "Tools: Python, OWASP",
rating: 5,
reviewCount: "12",
imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg",
},
{
id: "p2",
brand: "Cryptography",
name: "Password Cracker",
price: "Tools: Hashcat, Python",
rating: 5,
reviewCount: "8",
imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg",
},
{
id: "p3",
brand: "Simulation",
name: "Phishing Lab",
price: "Tools: Gophish, OSINT",
rating: 5,
reviewCount: "21",
imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg",
},
{
id: "p4",
brand: "Web Exploit",
name: "Scanner-2",
price: "Tools: Python, OWASP",
rating: 5,
reviewCount: "5",
imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg",
},
{
id: "p5",
brand: "Cryptography",
name: "Cracker-2",
price: "Tools: Hashcat, Python",
rating: 5,
reviewCount: "10",
imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg",
},
{ id: "p1", brand: "Web Exploit", name: "Vulnerability Scanner", price: "Tools: Python, OWASP", rating: 5, reviewCount: "12", imageSrc: "http://img.b2bpic.net/free-photo/afraid-man-panicking-after-seeing-security-breach-notification-data-center_482257-99180.jpg" },
{ id: "p2", brand: "Cryptography", name: "Password Cracker", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "8", imageSrc: "http://img.b2bpic.net/free-photo/double-exposure-caucasian-man-virtual-reality-vr-headset-is-presumably-gamer-hacker-cracking-code-into-secure-network-server-with-lines-code_146671-18934.jpg" },
{ id: "p3", brand: "Simulation", name: "Phishing Lab", price: "Tools: Gophish, OSINT", rating: 5, reviewCount: "21", imageSrc: "http://img.b2bpic.net/free-photo/notebook-with-people-icons_1134-402.jpg" },
{ id: "p4", brand: "Web Exploit", name: "Scanner-2", price: "Tools: Python, OWASP", rating: 5, reviewCount: "5", imageSrc: "http://img.b2bpic.net/free-photo/businessman-studying-infographics-performance-metrics_482257-122632.jpg" },
{ id: "p5", brand: "Cryptography", name: "Cracker-2", price: "Tools: Hashcat, Python", rating: 5, reviewCount: "10", imageSrc: "http://img.b2bpic.net/free-psd/gradient-data-privacy-design-template_23-2149316852.jpg" }
]}
title="Featured Projects"
description="Selected projects and proof-of-concepts highlighting my technical security capabilities."
@@ -220,33 +116,9 @@ export default function LandingPage() {
textboxLayout="split"
useInvertedBackground={false}
metrics={[
{
id: "c1",
value: "eJPT",
title: "Offensive Security",
items: [
"Certified",
"Active",
],
},
{
id: "c2",
value: "Security+",
title: "CompTIA",
items: [
"Certified",
"Global",
],
},
{
id: "c3",
value: "CEH",
title: "Certified Hacker",
items: [
"Certified",
"Industry",
],
},
{ id: "c1", value: "eJPT", title: "Offensive Security", items: ["Certified", "Active"] },
{ id: "c2", value: "Security+", title: "CompTIA", items: ["Certified", "Global"] },
{ id: "c3", value: "CEH", title: "Certified Hacker", items: ["Certified", "Industry"] }
]}
title="Certifications & Ranks"
description="Validated expertise and competitive engagement."
@@ -261,36 +133,9 @@ export default function LandingPage() {
title="Latest Writeups"
description="Tutorials, exploit analyses, and CTF walkthroughs from my research."
blogs={[
{
id: "b1",
category: "Writeup",
title: "Solving the XYZ CTF",
excerpt: "How to bypass filters and get root.",
imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg",
authorName: "Me",
authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg",
date: "Oct 2023",
},
{
id: "b2",
category: "Analysis",
title: "Phishing Tactics",
excerpt: "Deep dive into modern phishing.",
imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg",
authorName: "Me",
authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg",
date: "Sep 2023",
},
{
id: "b3",
category: "Tool",
title: "Automation with Bash",
excerpt: "Efficiency in recon workflows.",
imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg",
authorName: "Me",
authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg",
date: "Aug 2023",
},
{ id: "b1", category: "Writeup", title: "Solving the XYZ CTF", excerpt: "How to bypass filters and get root.", imageSrc: "http://img.b2bpic.net/free-photo/lieutenant-colonel-gathering-intelligence-from-federal-radar-systems_482257-89745.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-hacker-with-mask_23-2148165964.jpg", date: "Oct 2023" },
{ id: "b2", category: "Analysis", title: "Phishing Tactics", excerpt: "Deep dive into modern phishing.", imageSrc: "http://img.b2bpic.net/free-photo/top-view-brown-coffee-seeds-with-board-wi-fi-password-sign_140725-27787.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/portrait-handsome-young-man-with-arms-crossed-holding-white-headphone-around-his-neck_23-2148096439.jpg", date: "Sep 2023" },
{ id: "b3", category: "Tool", title: "Automation with Bash", excerpt: "Efficiency in recon workflows.", imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-concept-shield-protecting-data_23-2152001124.jpg", authorName: "Me", authorAvatar: "http://img.b2bpic.net/free-photo/hacker-with-anonymous-mask_23-2147985393.jpg", date: "Aug 2023" }
]}
/>
</div>
@@ -298,21 +143,13 @@ export default function LandingPage() {
<div id="contact" data-section="contact">
<ContactCTA
useInvertedBackground={false}
background={{
variant: "plain",
}}
background={{ variant: "plain" }}
tag="Let's talk"
title="Get in touch"
description="Interested in working together or hiring? Reach out anytime."
buttons={[
{
text: "Send Email",
href: "mailto:sec@example.com",
},
{
text: "GitHub Profile",
href: "https://github.com",
},
{ text: "Send Email", href: "mailto:sec@example.com" },
{ text: "GitHub Profile", href: "https://github.com" }
]}
/>
</div>
@@ -321,32 +158,8 @@ export default function LandingPage() {
<FooterBaseReveal
logoText="CyberSecPortfolio"
columns={[
{
title: "Social",
items: [
{
label: "LinkedIn",
href: "#",
},
{
label: "GitHub",
href: "#",
},
],
},
{
title: "Resources",
items: [
{
label: "Blog",
href: "#blog",
},
{
label: "Privacy Policy",
href: "#",
},
],
},
{ title: "Social", items: [{ label: "LinkedIn", href: "#" }, { label: "GitHub", href: "#" }] },
{ title: "Resources", items: [{ label: "Blog", href: "#blog" }, { label: "Privacy Policy", href: "#" }] }
]}
copyrightText="© 2024 Cybersecurity Portfolio"
/>