mirror of
https://github.com/Snigdha-OS/Snigdha-OS.github.io.git
synced 2025-09-06 04:35:18 +02:00
7 lines
11 KiB
JavaScript
7 lines
11 KiB
JavaScript
import{c as u,j as e,r as s}from"./script.js";import{m as d}from"./proxy.js";import{T as g}from"./terminal.js";import{C as f}from"./clipboard.js";/**
|
||
* @license lucide-react v0.344.0 - ISC
|
||
*
|
||
* This source code is licensed under the ISC license.
|
||
* See the LICENSE file in the root directory of this source tree.
|
||
*/const h=u("Search",[["circle",{cx:"11",cy:"11",r:"8",key:"4ej97u"}],["path",{d:"m21 21-4.3-4.3",key:"1qie3q"}]]);function y({value:o,onChange:t}){return e.jsxs("div",{className:"relative",children:[e.jsx("input",{type:"text",value:o,onChange:t,placeholder:"Search tools...",className:"w-full pl-12 pr-6 py-3 bg-white/80 backdrop-blur-sm border border-gray-200 rounded-lg focus:ring-2 focus:ring-cornflower-blue focus:border-cornflower-blue outline-none transition-all duration-300 ease-in-out hover:border-gray-300 hover:bg-white/90"}),e.jsx(h,{className:"absolute left-4 top-1/2 -translate-y-1/2 h-5 w-5 text-gray-400 transition-all"})]})}function x({categories:o,selectedCategory:t,onSelect:n}){return e.jsx("div",{className:"flex flex-wrap gap-2",children:o.map(i=>e.jsx(d.button,{whileHover:{scale:1.05},whileTap:{scale:.95},onClick:()=>n(i),className:`px-4 py-2 rounded-full text-sm font-medium transition-colors ${t===i?"bg-cornflower-blue text-white":"bg-white/80 text-gray-600 hover:bg-gray-100"}`,children:i},i))})}const S=({message:o,onClose:t})=>e.jsxs(d.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},exit:{opacity:0,y:20},transition:{duration:.3},className:"fixed bottom-4 left-1/2 transform -translate-x-1/2 bg-cornflower-blue text-white px-4 py-2 rounded-lg shadow-lg",children:[e.jsx("div",{className:"flex items-center gap-2",children:e.jsx("span",{children:o})}),e.jsx("button",{onClick:t,className:"absolute top-0 right-0 p-1 text-white hover:bg-cornflower-blue/80 rounded-full","aria-label":"Close toast",children:"×"})]});function w({name:o,description:t,category:n,command:i}){const[c,a]=s.useState(!1),[l,r]=s.useState(!1),m=()=>{navigator.clipboard.writeText(i).then(()=>{a(!0),r(!0),setTimeout(()=>{a(!1),r(!1)},3e3)}).catch(p=>console.error("Failed to copy: ",p))};return e.jsxs(d.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},whileHover:{scale:1.05,y:-5},transition:{duration:.3},className:"bg-white p-6 rounded-lg shadow-xl border border-gray-100 transform hover:shadow-2xl transition-all",children:[e.jsxs("div",{className:"flex items-center gap-4 mb-4",children:[e.jsx("div",{className:"p-4 bg-cornflower-blue/20 rounded-full",children:e.jsx(g,{className:"h-7 w-7 text-cornflower-blue"})}),e.jsx("h3",{className:"text-2xl font-semibold text-gray-900",children:o})]}),e.jsx("p",{className:"text-gray-600 text-lg mb-4",children:t}),e.jsxs("div",{className:"flex items-center justify-between mt-4",children:[e.jsx("span",{className:"text-sm font-medium text-cornflower-blue",children:n}),e.jsxs("div",{className:"flex items-center gap-2",children:[e.jsx("code",{className:"text-sm bg-gray-100 px-3 py-1 rounded text-gray-800",children:i}),e.jsx("button",{onClick:m,className:"p-2 bg-cornflower-blue/20 rounded-full hover:bg-cornflower-blue/30 transition-all","aria-label":"Copy command",children:c?e.jsx("span",{className:"text-sm text-cornflower-blue",children:"Copied!"}):e.jsx(f,{className:"h-5 w-5 text-cornflower-blue"})})]})]}),l&&e.jsx(S,{message:"Command copied! Paste it in your terminal with Ctrl + Shift + V (Cmd + Shift + V on Mac)",onClose:()=>r(!1)})]})}const b=[{id:"1",name:"Nmap",description:"Network exploration tool and security scanner",category:"Information Gathering",command:"sudo pacman -S nmap"},{id:"2",name:"Wireshark",description:"Network protocol analyzer for real-time packet capture",category:"Sniffing & Spoofing",command:"sudo pacman -S wireshark"},{id:"3",name:"Metasploit",description:"Penetration testing framework",category:"Exploitation Tools",command:"sudo pacman -S metasploit"},{id:"4",name:"Burp Suite",description:"Web vulnerability scanner and proxy tool",category:"Web Applications",command:"sudo pacman -S burpsuite"},{id:"5",name:"Aircrack-ng",description:"Complete suite for wireless network security assessment",category:"Wireless Attacks",command:"sudo pacman -S aircrack-ng"},{id:"6",name:"John the Ripper",description:"Password cracker and hash analyzer",category:"Password Attacks",command:"sudo pacman -S john"},{id:"7",name:"Hydra",description:"Brute-force password cracking tool",category:"Password Attacks",command:"sudo pacman -S hydra"},{id:"8",name:"Nikto",description:"Web server scanner for vulnerabilities",category:"Web Applications",command:"sudo pacman -S nikto"},{id:"9",name:"Airgeddon",description:"Multi-use bash script for wireless pentesting",category:"Wireless Attacks",command:"sudo pacman -S airgeddon"},{id:"10",name:"OWASP ZAP",description:"Open-source web application security scanner",category:"Web Applications",command:"sudo pacman -S zap"},{id:"11",name:"Ettercap",description:"Comprehensive suite for man-in-the-middle attacks",category:"Sniffing & Spoofing",command:"sudo pacman -S ettercap"},{id:"12",name:"Kali Linux",description:"Linux distribution with pre-installed security tools",category:"All",command:"sudo pacman -S kali-linux"},{id:"13",name:"Netcat",description:"Network utility for reading/writing network connections",category:"Information Gathering",command:"sudo pacman -S netcat"},{id:"14",name:"Netdiscover",description:"Network discovery tool for locating devices on a network",category:"Information Gathering",command:"sudo pacman -S netdiscover"},{id:"15",name:"SQLmap",description:"Automated SQL injection and database takeover tool",category:"Exploitation Tools",command:"sudo pacman -S sqlmap"},{id:"16",name:"Gobuster",description:"Directory and DNS busting tool for web enumeration",category:"Information Gathering",command:"sudo pacman -S gobuster"},{id:"17",name:"Nikto2",description:"Web scanner for vulnerabilities, similar to Nikto",category:"Web Applications",command:"sudo pacman -S nikto2"},{id:"18",name:"The Harvester",description:"Information gathering tool for open-source intelligence (OSINT)",category:"Information Gathering",command:"sudo pacman -S theharvester"},{id:"19",name:"Social-Engineer Toolkit (SET)",description:"Penetration testing framework for social engineering",category:"Exploitation Tools",command:"sudo pacman -S setoolkit"},{id:"20",name:"Burp Suite Pro",description:"Advanced web vulnerability scanner with additional features",category:"Web Applications",command:"sudo pacman -S burpsuite_pro"},{id:"21",name:"Beef",description:"The Browser Exploitation Framework for testing browser security",category:"Exploitation Tools",command:"sudo pacman -S beef"},{id:"22",name:"Sn1per",description:"Automated pentesting tool for information gathering",category:"Information Gathering",command:"sudo pacman -S sn1per"},{id:"23",name:"Responder",description:"Lateral movement tool for exploiting network protocols",category:"Sniffing & Spoofing",command:"sudo pacman -S responder"},{id:"24",name:"Sublist3r",description:"Subdomain enumeration tool for information gathering",category:"Information Gathering",command:"sudo pacman -S sublist3r"},{id:"25",name:"Hashcat",description:"Advanced password cracking tool",category:"Password Attacks",command:"sudo pacman -S hashcat"},{id:"26",name:"Mimikatz",description:"Windows credential dumper for obtaining passwords",category:"Exploitation Tools",command:"sudo pacman -S mimikatz"},{id:"27",name:"HashID",description:"Hash identifier tool for identifying hash types",category:"Password Attacks",command:"sudo pacman -S hashid"},{id:"28",name:"BloodHound",description:"Active Directory enumeration tool for post-exploitation",category:"Exploitation Tools",command:"sudo pacman -S bloodhound"},{id:"29",name:"Lynis",description:"Security auditing tool for Unix-based systems",category:"Information Gathering",command:"sudo pacman -S lynis"},{id:"30",name:"Wfuzz",description:"Web fuzzing tool for finding vulnerabilities in web apps",category:"Web Applications",command:"sudo pacman -S wfuzz"},{id:"31",name:"Cobalt Strike",description:"Adversary simulation software for penetration testers",category:"Exploitation Tools",command:"sudo pacman -S cobaltstrike"},{id:"32",name:"Shodan",description:"Search engine for Internet-connected devices",category:"Information Gathering",command:"sudo pacman -S shodan"},{id:"33",name:"CloudBrute",description:"Brute force cloud storage services",category:"Password Attacks",command:"sudo pacman -S cloudbrute"},{id:"34",name:"FuzzBunch",description:"A penetration testing framework developed by the NSA",category:"Exploitation Tools",command:"sudo pacman -S fuzzbunch"},{id:"35",name:"PowerSploit",description:"A PowerShell-based exploitation framework",category:"Exploitation Tools",command:"sudo pacman -S powersploit"},{id:"36",name:"Powershell Empire",description:"Post-exploitation and agent-based framework",category:"Exploitation Tools",command:"sudo pacman -S empire"},{id:"37",name:"Reaver",description:"Wi-Fi Protected Setup (WPS) attack tool",category:"Wireless Attacks",command:"sudo pacman -S reaver"},{id:"38",name:"Kismet",description:"Wireless network detector, sniffer, and intrusion detection system",category:"Wireless Attacks",command:"sudo pacman -S kismet"},{id:"39",name:"Nikto3",description:"Web server scanner that identifies vulnerabilities",category:"Web Applications",command:"sudo pacman -S nikto3"},{id:"40",name:"Scapy",description:"Network manipulation tool for penetration testing",category:"Sniffing & Spoofing",command:"sudo pacman -S scapy"},{id:"41",name:"SSLScan",description:"SSL scanner for finding vulnerabilities in SSL implementations",category:"Web Applications",command:"sudo pacman -S sslscan"},{id:"42",name:"Gophish",description:"Open-source phishing framework for social engineering testing",category:"Social Engineering",command:"sudo pacman -S gophish"},{id:"43",name:"Empire",description:"Post-exploitation framework with PowerShell agents",category:"Exploitation Tools",command:"sudo pacman -S empire"},{id:"44",name:"Pipal",description:"Password analysis tool to identify weak passwords",category:"Password Attacks",command:"sudo pacman -S pipal"},{id:"45",name:"Rekall",description:"Forensic memory analysis tool for investigating malware",category:"Forensics",command:"sudo pacman -S rekall"}],k=["All","Information Gathering","Sniffing & Spoofing","Exploitation Tools","Web Applications","Wireless Attacks","Password Attacks","Social Engineering","Forensics"];function C(){const[o,t]=s.useState(""),[n,i]=s.useState("All"),c=s.useMemo(()=>b.filter(a=>{const l=a.name.toLowerCase().includes(o.toLowerCase())||a.description.toLowerCase().includes(o.toLowerCase()),r=n==="All"||a.category===n;return l&&r}),[o,n]);return e.jsx("div",{className:"py-12",children:e.jsxs("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:[e.jsxs(d.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},className:"text-center mb-12",children:[e.jsx("h1",{className:"text-4xl font-bold text-gray-900",children:"Snigdha OS Tools"}),e.jsx("p",{className:"mt-4 text-lg text-gray-600",children:"Explore our comprehensive collection of security and penetration testing tools"})]}),e.jsxs("div",{className:"space-y-8",children:[e.jsx("div",{className:"max-w-xl mx-auto",children:e.jsx(y,{value:o,onChange:a=>t(a.target.value)})}),e.jsx(x,{categories:k,selectedCategory:n,onSelect:i}),e.jsx("div",{className:"grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-6",children:c.map(a=>e.jsx(w,{...a},a.id))}),c.length===0&&e.jsx("div",{className:"text-center py-12",children:e.jsx("p",{className:"text-gray-500",children:"No tools found matching your criteria"})})]})]})})}export{C as default};
|