Skip to content

Commit

Permalink
update contents
Browse files Browse the repository at this point in the history
  • Loading branch information
devsdenepal committed Jan 17, 2024
1 parent 320e7c8 commit ca092ad
Show file tree
Hide file tree
Showing 4 changed files with 84 additions and 30 deletions.
59 changes: 55 additions & 4 deletions article.html
Original file line number Diff line number Diff line change
Expand Up @@ -28,9 +28,9 @@
<section class="text-gray-400 bg-gray-900 body-font">
<div class="container mx-auto flex px-5 py-24 items-center justify-center flex-col">
<img class="lg:w-2/6 md:w-3/6 w-5/6 mb-10 object-cover object-center rounded" alt="hero" id="img" src="https://dummyimage.com/720x600">
<div class="text-center lg:w-2/3 w-full">
<div class="text-center lg:w-2/3 w-full"><a id="t-l" href="#">
<h1 class="title-font sm:text-4xl text-3xl mb-4 font-medium text-white" id="title">Loading...</h1>
<p class="leading-relaxed mb-8" id="content">Loading...</p>
</a><p class="leading-relaxed mb-8" id="content">Loading...</p>
<!-- <div class="flex justify-center">
<button class="inline-flex text-white bg-indigo-500 border-0 py-2 px-6 focus:outline-none hover:bg-indigo-600 rounded text-lg">Button</button>
<button class="ml-4 inline-flex text-gray-400 bg-gray-800 border-0 py-2 px-6 focus:outline-none hover:bg-gray-700 hover:text-white rounded text-lg">Button</button>
Expand All @@ -39,5 +39,56 @@ <h1 class="title-font sm:text-4xl text-3xl mb-4 font-medium text-white" id="titl
</div>
</section>
<script src="assets/js/article.js"></script>
</body>
</html>
<!-- footer -->
<footer class="text-gray-400 bg-gray-900 body-font">
<div class="container px-5 py-8 mx-auto flex items-center sm:flex-row flex-col">
<a class="flex title-font font-medium items-center md:justify-start justify-center text-white">
<img src="https://avatars.githubusercontent.com/u/134789824?s=48&v=4" style="border-radius: 50%;">
<span class="ml-3 text-xl">Krimson Squad</span>
</a>
<p class="text-sm text-gray-400 sm:ml-4 sm:pl-4 sm:border-l-2 sm:border-gray-800 sm:py-2 sm:mt-0 mt-4">© 2023
Krimson Squad —
<a href="https://github.com/Krimson-Squad" class=" text-gray-500 ml-1" target="_blank"
rel="noopener noreferrer">@devsdenepal</a>
</p>
<span class="inline-flex sm:ml-auto sm:mt-0 mt-4 justify-center sm:justify-start">
<a class="text-gray-400">
<svg fill="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-5 h-5"
viewBox="0 0 24 24">
<path d="M18 2h-3a5 5 0 00-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 011-1h3z"></path>
</svg>
</a>
<a class="ml-3 text-gray-400">
<svg fill="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-5 h-5"
viewBox="0 0 24 24">
<path
d="M23 3a10.9 10.9 0 01-3.14 1.53 4.48 4.48 0 00-7.86 3v1A10.66 10.66 0 013 4s-4 9 5 13a11.64 11.64 0 01-7 2c9 5 20 0 20-11.5a4.5 4.5 0 00-.08-.83A7.72 7.72 0 0023 3z">
</path>
</svg>
</a>
<a class="ml-3 text-gray-400">
<svg fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2"
class="w-5 h-5" viewBox="0 0 24 24">
<rect width="20" height="20" x="2" y="2" rx="5" ry="5"></rect>
<path d="M16 11.37A4 4 0 1112.63 8 4 4 0 0116 11.37zm1.5-4.87h.01"></path>
</svg>
</a>
<a class="ml-3 text-gray-400">
<svg fill="currentColor" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="0"
class="w-5 h-5" viewBox="0 0 24 24">
<path stroke="none"
d="M16 8a6 6 0 016 6v7h-4v-7a2 2 0 00-2-2 2 2 0 00-2 2v7h-4v-7a6 6 0 016-6zM2 9h4v12H2z"></path>
<circle cx="4" cy="4" r="2" stroke="none"></circle>
</svg>
</a>
</span>
</div>
</footer>
<!-- 100% privacy-first analytics -->
<script async defer src="https://scripts.simpleanalyticscdn.com/latest.js"></script>
<noscript><img src="https://queue.simpleanalyticscdn.com/noscript.gif" alt=""
referrerpolicy="no-referrer-when-downgrade" /></noscript>
<script src="assets/js/main.js"></script>
</body>

</html>
1 change: 1 addition & 0 deletions assets/js/article.js
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ const final_url = '/article.html?view='+sub_url;
pages.forEach(function (page) {
if (page.url == post_url) {
document.getElementById('title').innerText = page.title;
document.getElementById('t-l').href = page.github_link;
if(page.image_url == "N/A"){
document.getElementById("img").src = "./favicon.ico"
}
Expand Down
52 changes: 27 additions & 25 deletions data/json/post.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,43 +11,44 @@
"github_link": "https://github.com/Krimson-Squad/andro-predom",
"tag": "Shell"
},
{
"title": "AndherNagri",
"url": "/article.html?view=andhernagri-2080",
"description": "A vulnerable site to practice XSS and SQL injection.",
"content": "",
"featured": "false",
"image_url": "N/A",
"github_link": "https://github.com/Krimson-Squad/AndherNagri",
"tag": "PHP"
},

{
"title": "xupa-rustam",
"url": "/article.html?view=xupa-rustam-2080",
"description": "Python based Pentesting Brute-Force tool to crack username and password of a simple traditional website ",
"content": "loading...",
"content": "Description \n --- \n This Python based Pentesting CLI tool is made to host Brute-Force attack using requests module, and for keeping anonymity of the attacker's IP address Tor proxy is being used. The brute force works upon user defined admin and password list which tries each password from the list to every admin from the list. \n --- \n Installation \n --- \n $ git clone https://github.com/devsdenepal/xupa-rustam \n --- \n Contribute \n --- \n If you have any idea or suggestions to improve the code or interface, you can simply create a PR to this repo.",
"featured": "false",
"image_url": "N/A",
"image_url": "https://raw.githubusercontent.com/devsdenepal/xupa-rustam/main/screenshots/IMG-20230403-WA0022.jpg",
"github_link": "https://github.com/Krimson-Squad/xupa-rustam",
"tag": "Python"
},
{
"title": "PhantomBlitz",
"url": "/article.html?view=phantomblitz-2080",
"description": "PhantomBlitz: Yet another tool for reverse shell execution & payload generator by Dev. Gautam Kumar ",
"content": "loading...",
"content": "Description \n --- \n PhantomBlitz is a Python-based framework that creates an executable file with various parameters. It allows users to perform a reverse TCP connection and execute cmd commands.\n ---\n Usage \n --- \n PhantomBlazer can be executed with the following parameters: \n --mode/-m: Mode: accepts > build or listen \n --lhost/-lh: The local host IP address \n --lport/-lp: The local port number \n --output/-o: The output file name \n Example: python3 phantomblazer.py -m build --lh <ip.address> --lp <port> --output<application.name>.exe Before payload execution on client: python3 phantomblazer.py -m listen --lh <ip.address> -lp <port> \n --- \n DISCLAIMER \n ---\n This tool is intended for legal and ethical use only. The creator of this tool is not responsible for any illegal or unethical use of this tool. \n The tool creates a .exe file which runs as a background and creates a reverse TCP connection, allowing for remote command execution. This tool is intended for debugging purposes and should not be used to gain unauthorized access to systems. \n Please use this tool at your own risk and with the appropriate permissions from the system owners. Any actions taken with this tool are the sole responsibility of the user. \n By using this tool, you agree to the terms and conditions outlined above and acknowledge that any misuse of this tool is strictly prohibited.",
"featured": "false",
"image_url": "N/A",
"image_url": "https://user-images.githubusercontent.com/111997815/235445673-e72f087d-ce6f-4737-a1eb-f36e1fcf4aad.png",
"github_link": "https://github.com/Krimson-Squad/PhantomBlitz",
"tag": "Python"
},
{
"title":"ShadowCipher",
"url":"/article.html?view=shadow-cipher-2080",
"description":"A simple tool that allows you to generate wordlists based on first and last names. It provides various patterns and variations to create a wide range of potential words for password cracking, data analysis, or other purposes. ",
"content":"Description \n --- \n The ShadowCipher is a simple tool that allows you to generate wordlists based on first and last names. It provides various patterns and variations to create a wide range of potential words for password cracking, data analysis, or other purposes. \n --- \n Usage \n --- \n To use the ShadowCipher, follow the steps below: \n Clone the repository or download the ShadowCipher.py file. \n Ensure you have Python 3 installed on your machine. \n Open a terminal or command prompt and navigate to the directory where ShadowCipher.py is located. \n Run the following command: \n python ShadowCipher.py [-h] [-n COUNT] [-sv FILE_NAME] first_name last_name \n Replace first_name with the target's first name. \n Replace last_name with the target's last name. \n Use the optional -n flag followed by the desired count to specify the number of words to generate (default: 100). \n Example: python ShadowCipher.py -n 500 John Doe -sv johndoe_wordlist.txt \n The tool will generate a wordlist based on the provided names and display the total number of words generated.",
"featured":"false",
"image_url":"https://camo.githubusercontent.com/b2808f38f0076526f17deec355ac5bbf8d41526dbab32073fdf5c6349bc22549/68747470733a2f2f63646e2e646973636f72646170702e636f6d2f6174746163686d656e74732f3439323335313134353330363735313030342f313132363034383434363532393431373233362f696d6167652e706e67",
"github_link":"https://github.com/Krimson-Squad/ShadowCipher",
"tag":"Python"
},
{
"title": "unvetion",
"url": "/article.html?view=unvetion-2080",
"description": "MINI RECON PROJECT.",
"content": "loading...",
"featured": "false",
"image_url": "N/A",
"image_url": "https://github.com/Krimson-Squad/unvetion/blob/main/Screenshot%202023-09-16%20171301.png?raw=true",
"github_link": "https://github.com/Krimson-Squad/unvetion",
"tag": "Python"
},
Expand All @@ -57,7 +58,7 @@
"description": "List of common T1 and SO(s) used by Threat groups.",
"content": "loading...",
"featured": "false",
"image_url": "N/A",
"image_url": "https://github.com/Krimson-Squad/common-techniques-n-software/assets/111997815/4fa87712-b119-4779-810a-227b3d76c48b",
"github_link": "https://github.com/Krimson-Squad/common-techniques-n-software",
"tag": "Markdown"
},
Expand All @@ -71,15 +72,16 @@
"github_link": "https://github.com/Krimson-Squad/WebSecProbe",
"tag": "Python"
},
{
"title":"ShadowCipher",
"url":"/article.html?view=shadow-cipher-2080",
"description":"A simple tool that allows you to generate wordlists based on first and last names. It provides various patterns and variations to create a wide range of potential words for password cracking, data analysis, or other purposes. ",
"content":"loading...",
"featured":"false",
"image_url":"N/A",
"github_link":"https://github.com/Krimson-Squad/ShadowCipher",
"tag":"Python"

{
"title": "AndherNagri",
"url": "/article.html?view=andhernagri-2080",
"description": "A vulnerable site to practice XSS and SQL injection.",
"content": "A vulnerable site to practice XSS and SQL injection. \n We updated a demo banking dbms to be vulnerable to practice with, in according to our tutorial video.",
"featured": "false",
"image_url": "N/A",
"github_link": "https://github.com/Krimson-Squad/AndherNagri",
"tag": "PHP"
}
]
}
2 changes: 1 addition & 1 deletion index.html
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ <h1 class="title-font sm:text-4xl text-3xl mb-4 font-medium text-white">Recent H
</a>
<p class="text-sm text-gray-400 sm:ml-4 sm:pl-4 sm:border-l-2 sm:border-gray-800 sm:py-2 sm:mt-0 mt-4">© 2023
Krimson Squad —
<a href="https://github.com/Krimson-Squad class=" text-gray-500 ml-1" target="_blank"
<a href="https://github.com/Krimson-Squad" class=" text-gray-500 ml-1" target="_blank"
rel="noopener noreferrer">@devsdenepal</a>
</p>
<span class="inline-flex sm:ml-auto sm:mt-0 mt-4 justify-center sm:justify-start">
Expand Down

0 comments on commit ca092ad

Please sign in to comment.