Files
Snigdha-OS.github.io/Features.js
eshanized e87cc88f51 Updates
2025-01-16 06:49:20 +05:30

7 lines
11 KiB
JavaScript
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

import{c as u,j as e,r as s}from"./script.js";import{m as d}from"./proxy.js";import{T as g}from"./terminal.js";import{C as f}from"./clipboard.js";/**
* @license lucide-react v0.344.0 - ISC
*
* This source code is licensed under the ISC license.
* See the LICENSE file in the root directory of this source tree.
*/const h=u("Search",[["circle",{cx:"11",cy:"11",r:"8",key:"4ej97u"}],["path",{d:"m21 21-4.3-4.3",key:"1qie3q"}]]);function y({value:o,onChange:t}){return e.jsxs("div",{className:"relative",children:[e.jsx("input",{type:"text",value:o,onChange:t,placeholder:"Search tools...",className:"w-full pl-12 pr-6 py-3 bg-white/80 backdrop-blur-sm border border-gray-200 rounded-lg focus:ring-2 focus:ring-cornflower-blue focus:border-cornflower-blue outline-none transition-all duration-300 ease-in-out hover:border-gray-300 hover:bg-white/90"}),e.jsx(h,{className:"absolute left-4 top-1/2 -translate-y-1/2 h-5 w-5 text-gray-400 transition-all"})]})}function x({categories:o,selectedCategory:t,onSelect:n}){return e.jsx("div",{className:"flex flex-wrap gap-2",children:o.map(i=>e.jsx(d.button,{whileHover:{scale:1.05},whileTap:{scale:.95},onClick:()=>n(i),className:`px-4 py-2 rounded-full text-sm font-medium transition-colors ${t===i?"bg-cornflower-blue text-white":"bg-white/80 text-gray-600 hover:bg-gray-100"}`,children:i},i))})}const S=({message:o,onClose:t})=>e.jsxs(d.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},exit:{opacity:0,y:20},transition:{duration:.3},className:"fixed bottom-4 left-1/2 transform -translate-x-1/2 bg-cornflower-blue text-white px-4 py-2 rounded-lg shadow-lg",children:[e.jsx("div",{className:"flex items-center gap-2",children:e.jsx("span",{children:o})}),e.jsx("button",{onClick:t,className:"absolute top-0 right-0 p-1 text-white hover:bg-cornflower-blue/80 rounded-full","aria-label":"Close toast",children:"×"})]});function w({name:o,description:t,category:n,command:i}){const[c,a]=s.useState(!1),[l,r]=s.useState(!1),m=()=>{navigator.clipboard.writeText(i).then(()=>{a(!0),r(!0),setTimeout(()=>{a(!1),r(!1)},3e3)}).catch(p=>console.error("Failed to copy: ",p))};return e.jsxs(d.div,{initial:{opacity:0,y:20},whileInView:{opacity:1,y:0},whileHover:{scale:1.05,y:-5},transition:{duration:.3},className:"bg-white p-6 rounded-lg shadow-xl border border-gray-100 transform hover:shadow-2xl transition-all",children:[e.jsxs("div",{className:"flex items-center gap-4 mb-4",children:[e.jsx("div",{className:"p-4 bg-cornflower-blue/20 rounded-full",children:e.jsx(g,{className:"h-7 w-7 text-cornflower-blue"})}),e.jsx("h3",{className:"text-2xl font-semibold text-gray-900",children:o})]}),e.jsx("p",{className:"text-gray-600 text-lg mb-4",children:t}),e.jsxs("div",{className:"flex items-center justify-between mt-4",children:[e.jsx("span",{className:"text-sm font-medium text-cornflower-blue",children:n}),e.jsxs("div",{className:"flex items-center gap-2",children:[e.jsx("code",{className:"text-sm bg-gray-100 px-3 py-1 rounded text-gray-800",children:i}),e.jsx("button",{onClick:m,className:"p-2 bg-cornflower-blue/20 rounded-full hover:bg-cornflower-blue/30 transition-all","aria-label":"Copy command",children:c?e.jsx("span",{className:"text-sm text-cornflower-blue",children:"Copied!"}):e.jsx(f,{className:"h-5 w-5 text-cornflower-blue"})})]})]}),l&&e.jsx(S,{message:"Command copied! Paste it in your terminal with Ctrl + Shift + V (Cmd + Shift + V on Mac)",onClose:()=>r(!1)})]})}const b=[{id:"1",name:"Nmap",description:"Network exploration tool and security scanner",category:"Information Gathering",command:"sudo pacman -S nmap"},{id:"2",name:"Wireshark",description:"Network protocol analyzer for real-time packet capture",category:"Sniffing & Spoofing",command:"sudo pacman -S wireshark"},{id:"3",name:"Metasploit",description:"Penetration testing framework",category:"Exploitation Tools",command:"sudo pacman -S metasploit"},{id:"4",name:"Burp Suite",description:"Web vulnerability scanner and proxy tool",category:"Web Applications",command:"sudo pacman -S burpsuite"},{id:"5",name:"Aircrack-ng",description:"Complete suite for wireless network security assessment",category:"Wireless Attacks",command:"sudo pacman -S aircrack-ng"},{id:"6",name:"John the Ripper",description:"Password cracker and hash analyzer",category:"Password Attacks",command:"sudo pacman -S john"},{id:"7",name:"Hydra",description:"Brute-force password cracking tool",category:"Password Attacks",command:"sudo pacman -S hydra"},{id:"8",name:"Nikto",description:"Web server scanner for vulnerabilities",category:"Web Applications",command:"sudo pacman -S nikto"},{id:"9",name:"Airgeddon",description:"Multi-use bash script for wireless pentesting",category:"Wireless Attacks",command:"sudo pacman -S airgeddon"},{id:"10",name:"OWASP ZAP",description:"Open-source web application security scanner",category:"Web Applications",command:"sudo pacman -S zap"},{id:"11",name:"Ettercap",description:"Comprehensive suite for man-in-the-middle attacks",category:"Sniffing & Spoofing",command:"sudo pacman -S ettercap"},{id:"12",name:"Kali Linux",description:"Linux distribution with pre-installed security tools",category:"All",command:"sudo pacman -S kali-linux"},{id:"13",name:"Netcat",description:"Network utility for reading/writing network connections",category:"Information Gathering",command:"sudo pacman -S netcat"},{id:"14",name:"Netdiscover",description:"Network discovery tool for locating devices on a network",category:"Information Gathering",command:"sudo pacman -S netdiscover"},{id:"15",name:"SQLmap",description:"Automated SQL injection and database takeover tool",category:"Exploitation Tools",command:"sudo pacman -S sqlmap"},{id:"16",name:"Gobuster",description:"Directory and DNS busting tool for web enumeration",category:"Information Gathering",command:"sudo pacman -S gobuster"},{id:"17",name:"Nikto2",description:"Web scanner for vulnerabilities, similar to Nikto",category:"Web Applications",command:"sudo pacman -S nikto2"},{id:"18",name:"The Harvester",description:"Information gathering tool for open-source intelligence (OSINT)",category:"Information Gathering",command:"sudo pacman -S theharvester"},{id:"19",name:"Social-Engineer Toolkit (SET)",description:"Penetration testing framework for social engineering",category:"Exploitation Tools",command:"sudo pacman -S setoolkit"},{id:"20",name:"Burp Suite Pro",description:"Advanced web vulnerability scanner with additional features",category:"Web Applications",command:"sudo pacman -S burpsuite_pro"},{id:"21",name:"Beef",description:"The Browser Exploitation Framework for testing browser security",category:"Exploitation Tools",command:"sudo pacman -S beef"},{id:"22",name:"Sn1per",description:"Automated pentesting tool for information gathering",category:"Information Gathering",command:"sudo pacman -S sn1per"},{id:"23",name:"Responder",description:"Lateral movement tool for exploiting network protocols",category:"Sniffing & Spoofing",command:"sudo pacman -S responder"},{id:"24",name:"Sublist3r",description:"Subdomain enumeration tool for information gathering",category:"Information Gathering",command:"sudo pacman -S sublist3r"},{id:"25",name:"Hashcat",description:"Advanced password cracking tool",category:"Password Attacks",command:"sudo pacman -S hashcat"},{id:"26",name:"Mimikatz",description:"Windows credential dumper for obtaining passwords",category:"Exploitation Tools",command:"sudo pacman -S mimikatz"},{id:"27",name:"HashID",description:"Hash identifier tool for identifying hash types",category:"Password Attacks",command:"sudo pacman -S hashid"},{id:"28",name:"BloodHound",description:"Active Directory enumeration tool for post-exploitation",category:"Exploitation Tools",command:"sudo pacman -S bloodhound"},{id:"29",name:"Lynis",description:"Security auditing tool for Unix-based systems",category:"Information Gathering",command:"sudo pacman -S lynis"},{id:"30",name:"Wfuzz",description:"Web fuzzing tool for finding vulnerabilities in web apps",category:"Web Applications",command:"sudo pacman -S wfuzz"},{id:"31",name:"Cobalt Strike",description:"Adversary simulation software for penetration testers",category:"Exploitation Tools",command:"sudo pacman -S cobaltstrike"},{id:"32",name:"Shodan",description:"Search engine for Internet-connected devices",category:"Information Gathering",command:"sudo pacman -S shodan"},{id:"33",name:"CloudBrute",description:"Brute force cloud storage services",category:"Password Attacks",command:"sudo pacman -S cloudbrute"},{id:"34",name:"FuzzBunch",description:"A penetration testing framework developed by the NSA",category:"Exploitation Tools",command:"sudo pacman -S fuzzbunch"},{id:"35",name:"PowerSploit",description:"A PowerShell-based exploitation framework",category:"Exploitation Tools",command:"sudo pacman -S powersploit"},{id:"36",name:"Powershell Empire",description:"Post-exploitation and agent-based framework",category:"Exploitation Tools",command:"sudo pacman -S empire"},{id:"37",name:"Reaver",description:"Wi-Fi Protected Setup (WPS) attack tool",category:"Wireless Attacks",command:"sudo pacman -S reaver"},{id:"38",name:"Kismet",description:"Wireless network detector, sniffer, and intrusion detection system",category:"Wireless Attacks",command:"sudo pacman -S kismet"},{id:"39",name:"Nikto3",description:"Web server scanner that identifies vulnerabilities",category:"Web Applications",command:"sudo pacman -S nikto3"},{id:"40",name:"Scapy",description:"Network manipulation tool for penetration testing",category:"Sniffing & Spoofing",command:"sudo pacman -S scapy"},{id:"41",name:"SSLScan",description:"SSL scanner for finding vulnerabilities in SSL implementations",category:"Web Applications",command:"sudo pacman -S sslscan"},{id:"42",name:"Gophish",description:"Open-source phishing framework for social engineering testing",category:"Social Engineering",command:"sudo pacman -S gophish"},{id:"43",name:"Empire",description:"Post-exploitation framework with PowerShell agents",category:"Exploitation Tools",command:"sudo pacman -S empire"},{id:"44",name:"Pipal",description:"Password analysis tool to identify weak passwords",category:"Password Attacks",command:"sudo pacman -S pipal"},{id:"45",name:"Rekall",description:"Forensic memory analysis tool for investigating malware",category:"Forensics",command:"sudo pacman -S rekall"}],k=["All","Information Gathering","Sniffing & Spoofing","Exploitation Tools","Web Applications","Wireless Attacks","Password Attacks","Social Engineering","Forensics"];function C(){const[o,t]=s.useState(""),[n,i]=s.useState("All"),c=s.useMemo(()=>b.filter(a=>{const l=a.name.toLowerCase().includes(o.toLowerCase())||a.description.toLowerCase().includes(o.toLowerCase()),r=n==="All"||a.category===n;return l&&r}),[o,n]);return e.jsx("div",{className:"py-12",children:e.jsxs("div",{className:"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8",children:[e.jsxs(d.div,{initial:{opacity:0,y:20},animate:{opacity:1,y:0},className:"text-center mb-12",children:[e.jsx("h1",{className:"text-4xl font-bold text-gray-900",children:"Snigdha OS Tools"}),e.jsx("p",{className:"mt-4 text-lg text-gray-600",children:"Explore our comprehensive collection of security and penetration testing tools"})]}),e.jsxs("div",{className:"space-y-8",children:[e.jsx("div",{className:"max-w-xl mx-auto",children:e.jsx(y,{value:o,onChange:a=>t(a.target.value)})}),e.jsx(x,{categories:k,selectedCategory:n,onSelect:i}),e.jsx("div",{className:"grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-6",children:c.map(a=>e.jsx(w,{...a},a.id))}),c.length===0&&e.jsx("div",{className:"text-center py-12",children:e.jsx("p",{className:"text-gray-500",children:"No tools found matching your criteria"})})]})]})})}export{C as default};