mirror of
https://github.com/Snigdha-OS/Snigdha-OS.github.io.git
synced 2025-09-05 20:26:43 +02:00
32 lines
14 KiB
JavaScript
32 lines
14 KiB
JavaScript
import{c as o,j as e,L as l,D as v,r as x}from"../main.js";import{m as r}from"./proxy-DPp9lXkG.js";import{U as m}from"./users-Bjd2Q3fX.js";import{S as h}from"./star-ULTsXjFw.js";import{G as j,S as g,W as N}from"./wifi-CD8OR96J.js";import{T as y}from"./terminal-DUBj4IUX.js";/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const p=o("ChevronRight",[["path",{d:"m9 18 6-6-6-6",key:"mthhwq"}]]);/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const S=o("Cpu",[["rect",{x:"4",y:"4",width:"16",height:"16",rx:"2",key:"1vbyd7"}],["rect",{x:"9",y:"9",width:"6",height:"6",key:"o3kz5p"}],["path",{d:"M15 2v2",key:"13l42r"}],["path",{d:"M15 20v2",key:"15mkzm"}],["path",{d:"M2 15h2",key:"1gxd5l"}],["path",{d:"M2 9h2",key:"1bbxkp"}],["path",{d:"M20 15h2",key:"19e6y8"}],["path",{d:"M20 9h2",key:"19tzq7"}],["path",{d:"M9 2v2",key:"165o2o"}],["path",{d:"M9 20v2",key:"i2bqo8"}]]);/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const k=o("Database",[["ellipse",{cx:"12",cy:"5",rx:"9",ry:"3",key:"msslwz"}],["path",{d:"M3 5V19A9 3 0 0 0 21 19V5",key:"1wlel7"}],["path",{d:"M3 12A9 3 0 0 0 21 12",key:"mv7ke4"}]]);/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const z=o("Lock",[["rect",{width:"18",height:"11",x:"3",y:"11",rx:"2",ry:"2",key:"1w4ew1"}],["path",{d:"M7 11V7a5 5 0 0 1 10 0v4",key:"fwvmzm"}]]);/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const T=o("Quote",[["path",{d:"M3 21c3 0 7-1 7-8V5c0-1.25-.756-2.017-2-2H4c-1.25 0-2 .75-2 1.972V11c0 1.25.75 2 2 2 1 0 1 0 1 1v1c0 1-1 2-2 2s-1 .008-1 1.031V20c0 1 0 1 1 1z",key:"4rm80e"}],["path",{d:"M15 21c3 0 7-1 7-8V5c0-1.25-.757-2.017-2-2h-4c-1.25 0-2 .75-2 1.972V11c0 1.25.75 2 2 2h.75c0 2.25.25 4-2.75 4v3c0 1 0 1 1 1z",key:"10za9r"}]]);/**
|
|
* @license lucide-react v0.344.0 - ISC
|
|
*
|
|
* This source code is licensed under the ISC license.
|
|
* See the LICENSE file in the root directory of this source tree.
|
|
*/const u=o("Wrench",[["path",{d:"M14.7 6.3a1 1 0 0 0 0 1.4l1.6 1.6a1 1 0 0 0 1.4 0l3.77-3.77a6 6 0 0 1-7.94 7.94l-6.91 6.91a2.12 2.12 0 0 1-3-3l6.91-6.91a6 6 0 0 1 7.94-7.94l-3.76 3.76z",key:"cbrjhi"}]]);function M(){return e.jsxs("section",{className:"relative min-h-[90vh] flex items-center overflow-hidden bg-gradient-to-r from-gray-900 to-gray-800",children:[e.jsx("div",{className:"absolute inset-0 bg-[url('https://cdn.pixabay.com/photo/2022/05/29/04/35/trails-7228378_1280.jpg?auto=format&fit=crop&q=80')] bg-cover bg-center opacity-15"}),e.jsx("div",{className:"absolute inset-0 bg-gradient-to-b from-transparent to-gray-900/50"}),e.jsx("div",{className:"relative mx-auto max-w-7xl px-4 sm:px-6 lg:px-8",children:e.jsxs(r.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},transition:{duration:.8,ease:"easeOut"},className:"text-center",children:[e.jsx(r.div,{animate:{rotate:[0,5,-5,0],scale:[1,1.1,1]},transition:{duration:2,repeat:1/0,repeatDelay:3},children:e.jsxs("svg",{xmlns:"http://www.w3.org/2000/svg",className:"mx-auto h-20 w-20 text-cornflower-blue",viewBox:"0 0 256 256",width:"24",height:"24",children:[e.jsx("path",{fill:"#6495ed","fill-rule":"evenodd",d:"m112.8 111.5q25.7 27 1.7 53.9-21.4 20.9-41.9 22.9c8.6-7.4 11-19.8 5.8-29.9q-26.1-27.2-39.2-47.7-15.1-39.6 40.9-53.8 9.4-15.5 91.4-55.6c15.4-4.4 31.8 2.8 38.9 17.2 7 14.4 2.8 31.8-10.2 41.3l-112.8 7.1q-1.9 20.7 25.4 44.6zm-35.5-43.4c-11.4 3.4-26.3 9.6-30.2 20.4-2 5.8-0.9 12.1 1.1 17.7 10.5 16.1 24.2 31.5 37.5 45.3l1 1.1 0.7 1.3c2.8 5.5 4 11.5 3.7 17.4 6-3.7 11.4-8.2 16.2-12.8 12.4-14.2 11.3-26.2-1.5-39.8-14.4-12.7-29.3-30.2-28.5-50.6zm124.1-45.1c-4.8-9.8-15.8-14.9-26.4-12.3-20.9 10.3-42.3 21.1-62.1 33.2-3.7 2.2-12.5 7.7-18.6 12.5l102.1-6.4c7.4-6.8 9.5-17.8 5-27z"}),e.jsx("path",{fill:"#6495ed","fill-rule":"evenodd",d:"m143.8 144.3q-25.7-26.9-1.8-53.9 21.5-20.8 42-22.8c-8.6 7.4-11 19.7-5.9 29.8q26.2 27.2 39.3 47.8 15 39.6-40.9 53.7-9.4 15.5-91.5 55.7c-15.4 4.4-31.7-2.9-38.8-17.3-7-14.4-2.8-31.7 10.1-41.3l112.8-7.1q2-20.7-25.3-44.6zm35.5 43.5c11.4-3.4 26.3-9.6 30.2-20.5 2-5.7 0.9-12-1.2-17.6-10.4-16.1-24.2-31.5-37.4-45.4l-1.1-1-0.6-1.3c-2.8-5.5-4-11.5-3.8-17.4-5.9 3.6-11.4 8.2-16.1 12.8-12.5 14.1-11.3 26.2 1.4 39.7 14.5 12.7 29.4 30.3 28.6 50.7zm-124.1 45.1c4.8 9.7 15.8 14.8 26.3 12.2 20.9-10.2 42.3-21 62.2-33.1 3.7-2.2 12.5-7.7 18.5-12.6l-102 6.5c-7.4 6.8-9.5 17.8-5 27z"})]})}),e.jsxs(r.h1,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},transition:{delay:.3},className:"mt-6 text-4xl font-bold tracking-tight text-white sm:text-6xl",children:[e.jsx("span",{className:"text-cornflower-blue",children:" ~"}),"Be",e.jsx("span",{className:"text-cornflower-blue",children:" Silent! "}),e.jsx("br",{}),"When It Is Time To",e.jsx("span",{className:"text-cornflower-blue",children:" Hear. "})]}),e.jsxs(r.p,{initial:{opacity:0},animate:{opacity:1},transition:{delay:.6},className:"mt-6 text-lg leading-8 text-gray-300 max-w-2xl mx-auto text-justify",children:["~ ",e.jsx("b",{className:"text-cornflower-blue",children:"Snigdha OS"})," revolutionizes the world of penetration testing by offering a cutting-edge suite of tools, a user-friendly and intuitive interface, and unparalleled performance. Designed to empower security professionals, Snigdha OS not only simplifies complex testing processes but also enhances the accuracy and speed of vulnerability assessments. Whether you're a beginner or a seasoned expert, Snigdha OS provides a seamless experience, ensuring that your security testing efforts are more effective, efficient, and reliable than ever before."]}),e.jsxs(r.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},transition:{delay:.9},className:"mt-10 flex items-center justify-center gap-x-6",children:[e.jsxs(l,{to:"/download",className:"group relative rounded-[5px] bg-cornflower-blue px-8 py-3 text-sm font-semibold text-white shadow-lg hover:bg-blue-600 transition-colors overflow-hidden",children:[e.jsxs("span",{className:"relative flex items-center gap-2",children:[e.jsx(v,{className:"h-4 w-4"}),"Download Now"]}),e.jsx("div",{className:"absolute inset-0 bg-white/20 transform -skew-x-12 -translate-x-full group-hover:translate-x-full transition-transform duration-700"})]}),e.jsxs(l,{to:"/features",className:"text-sm font-semibold leading-6 text-white flex items-center group",children:["User Docs",e.jsx(p,{className:"ml-1 h-4 w-4 transform group-hover:translate-x-1 transition-transform"})]}),e.jsxs(l,{to:"/features",className:"text-sm font-semibold leading-6 text-white flex items-center group",children:["Dev Docs",e.jsx(p,{className:"ml-1 h-4 w-4 transform group-hover:translate-x-1 transition-transform"})]})]})]})})]})}function C({title:t,description:s,icon:i,delay:a=0}){return e.jsx(r.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},transition:{duration:.5,delay:a},viewport:{once:!0},whileHover:{y:-5},className:"relative group",children:e.jsxs("div",{className:"rounded-xl bg-white/90 backdrop-blur-lg p-8 ring-1 ring-gray-200 hover:ring-cornflower-blue transition-all shadow-2xl hover:shadow-cornflower-blue/40 overflow-hidden flex flex-col justify-center items-center",children:[e.jsx("div",{className:"absolute inset-0 bg-gradient-to-r from-cornflower-blue/0 to-cornflower-blue/0 group-hover:from-cornflower-blue/10 group-hover:to-cornflower-blue/20 transition-all ease-in-out"}),e.jsx("div",{className:"mb-6 flex justify-center items-center",children:e.jsx(i,{className:"h-12 w-12 text-cornflower-blue transition-all transform group-hover:scale-105"})}),e.jsx("h3",{className:"text-2xl font-bold text-gray-900 mb-3 text-center",children:t}),e.jsx("p",{className:"text-lg text-gray-600 text-center",children:s})]})})}function V(){const[t,s]=x.useState([{label:"Active Users",value:"Loading...",icon:m},{label:"Security Tools",value:"Loading...",icon:u},{label:"GitHub Stars",value:"Loading...",icon:h}]),i=async a=>{try{const c=await(await fetch(`https://api.github.com/users/${a}`)).json(),d=await(await fetch(c.repos_url)).json(),f=d.reduce((w,b)=>w+b.stargazers_count,0);s([{label:" ",value:`${c.followers} Followers`,icon:m},{label:" ",value:`${d.length} Repositories`,icon:u},{label:" ",value:`${f} Stars`,icon:h}])}catch(n){console.error("Error fetching GitHub data:",n)}};return x.useEffect(()=>{i("Snigdha-OS")},[]),e.jsx("section",{className:"py-20 bg-gradient-to-b from-white to-gray-50",children:e.jsx("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:e.jsx("div",{className:"grid grid-cols-1 md:grid-cols-3 gap-8",children:t.map((a,n)=>e.jsxs(r.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},transition:{delay:n*.2},viewport:{once:!0},className:"text-center",children:[e.jsx(a.icon,{className:"h-8 w-8 text-cornflower-blue mx-auto mb-4"}),e.jsx(r.p,{initial:{scale:.5},whileInView:{scale:1},transition:{delay:n*.2+.2},viewport:{once:!0},className:"text-4xl font-bold text-gray-900 mb-2",children:a.value}),e.jsx("p",{className:"text-gray-600",children:a.label})]},a.label))})})})}const D=[{name:"Network Analysis",icon:j,color:"text-blue-500"},{name:"Penetration Testing",icon:g,color:"text-green-500"},{name:"Wireless Security",icon:N,color:"text-purple-500"},{name:"Cryptography",icon:z,color:"text-red-500"},{name:"Forensics",icon:k,color:"text-yellow-500"},{name:"Exploitation",icon:y,color:"text-pink-500"}];function H(){return e.jsx("section",{className:"py-20 bg-gradient-to-b from-gray-50 to-white",children:e.jsxs("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:[e.jsxs("div",{className:"text-center mb-12",children:[e.jsx("h2",{className:"text-3xl font-bold text-gray-900",children:"Security Tools Suite"}),e.jsx("p",{className:"mt-4 text-lg text-gray-600",children:"Comprehensive toolkit for security professionals"})]}),e.jsx("div",{className:"grid grid-cols-2 md:grid-cols-3 gap-8",children:D.map((t,s)=>e.jsxs(r.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},transition:{delay:s*.1,duration:.5},whileHover:{scale:1.05,boxShadow:"0 10px 20px rgba(0, 0, 0, 0.1)"},className:"flex flex-col items-center p-6 bg-white rounded-xl shadow-lg hover:shadow-2xl transition-transform duration-300 ease-in-out",children:[e.jsx("div",{className:"p-4 bg-gradient-to-r from-cornflower-blue/10 to-cornflower-blue/30 rounded-lg mb-4",children:e.jsx(t.icon,{className:`h-12 w-12 ${t.color} transition-all`})}),e.jsx("h3",{className:"text-lg font-semibold text-gray-900",children:t.name})]},t.name))})]})})}function q({content:t,author:s,role:i,delay:a=0}){return e.jsxs(r.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},transition:{delay:a,duration:.6},whileHover:{scale:1.05,boxShadow:"0 10px 20px rgba(0, 0, 0, 0.1)"},className:"bg-gradient-to-r from-cornflower-blue/10 to-cornflower-blue/30 p-8 rounded-lg shadow-lg relative transition-transform",children:[e.jsx(T,{className:"absolute top-4 right-4 h-10 w-10 text-cornflower-blue/20 transition-transform transform hover:scale-110"}),e.jsx("p",{className:"text-gray-600 mb-6 text-lg leading-relaxed",children:t}),e.jsxs("div",{children:[e.jsx("p",{className:"font-semibold text-gray-900 text-lg",children:s}),e.jsx("p",{className:"text-sm text-gray-500",children:i})]})]})}const I=[{content:"Snigdha OS has revolutionized our security testing workflow. The tools and interface are exceptional.",author:"Sarah Chen",role:"Security Engineer at TechCorp"},{content:"The best security-focused distribution I've used. Regular updates and great community support.",author:"Michael Rodriguez",role:"Penetration Tester"},{content:"Perfect for both beginners and advanced users. The documentation is comprehensive and helpful.",author:"Emma Thompson",role:"Cybersecurity Consultant"}],E=[{title:"Advanced Security Tools",description:"Access over 600 pre-installed security and penetration testing tools, ready to use out of the box.",icon:g},{title:"Powerful Terminal",description:"Enhanced command-line interface with custom tools and utilities for efficient security testing.",icon:y},{title:"Hardware Compatibility",description:"Optimized for various hardware configurations with excellent driver support.",icon:S}];function U(){return e.jsxs("div",{className:"bg-gray-50",children:[e.jsx(M,{}),e.jsx("section",{className:"py-20 bg-gradient-to-b from-gray-900 to-gray-50",children:e.jsxs("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:[e.jsxs("div",{className:"text-center mb-16",children:[e.jsx("h2",{className:"text-3xl font-bold text-white sm:text-4xl",children:"Powerful Features"}),e.jsx("p",{className:"mt-4 text-lg text-gray-300",children:"Everything you need for professional security testing"})]}),e.jsx("div",{className:"grid grid-cols-1 gap-8 sm:grid-cols-2 lg:grid-cols-3",children:E.map((t,s)=>e.jsx(C,{...t,delay:s*.2},t.title))})]})}),e.jsx(H,{}),e.jsx("section",{className:"py-20 bg-white",children:e.jsxs("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:[e.jsxs("div",{className:"text-center mb-12",children:[e.jsx("h2",{className:"text-3xl font-bold text-gray-900",children:"What Users Say"}),e.jsx("p",{className:"mt-4 text-lg text-gray-600",children:"Trusted by security professionals worldwide"})]}),e.jsx("div",{className:"grid grid-cols-1 md:grid-cols-3 gap-8",children:I.map((t,s)=>e.jsx(q,{...t,delay:s*.2},t.author))})]})}),e.jsx(V,{})]})}export{U as default};
|