diff --git a/assets/js/main.js b/assets/js/main.js new file mode 100644 index 0000000..eaf4ea3 --- /dev/null +++ b/assets/js/main.js @@ -0,0 +1,48 @@ +function bring_posts() { + var xhr = new XMLHttpRequest(); + var url = "./data/json/post.json"; // Replace with your API endpoint + xhr.open("GET", url, true); + xhr.responseType = "json"; + xhr.onload = function () { + if (xhr.status === 200) { + var response = xhr.response; + const result = response.result; + var pages = result + // Loop through the pages and display the information in the div + pages.forEach(function (page) { + if (page.featured == "true") { + console.table(page); + document.getElementById("highlighted_topic").innerText = page.title; + document.getElementById("highlighted_content").innerText = page.description; + document.getElementById("highlighted_banner").src = page.image_url; + } + else { + var blog_container=document.getElementById("blog_container"); + blog_container.innerHTML+=` +
+
+

${page.tag}

+

${page.title}

+

${page.description}

+ Read + + + + + +
+
+ ` + // console.warn("no page is featured"); + } + }); + // console.log(result.pages) + // console.table(result) + // + } else { + console.error("XHR request failed with status code:", xhr.status); + } + }; + xhr.send(); +} + diff --git a/data/json/post.json b/data/json/post.json new file mode 100644 index 0000000..b423160 --- /dev/null +++ b/data/json/post.json @@ -0,0 +1,84 @@ +{ + "result": [ + { + "title": "Andro-Predom", + "url": "/article?view=andro-predom-2080", + "description": "A Pentesting tool aimed to expose the possible risks of exploiting an android phone through adb commands simulated through the programme which comprises a range of exploiting and exposing features. ", + "content": "loading...", + "featured": "true", + "image_url": "https://github.com/devsdenepal/andro-predom/raw/main/ScreenShot_20230101193530.jpeg", + "github_link": "https://github.com/Krimson-Squad/andro-predom", + "tag": "Shell" + }, + { + "title": "AndherNagri", + "url": "/article?view=andhernagri-2080", + "description": "A vulnerable site to practice XSS and SQL injection.", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/AndherNagri", + "tag": "PHP" + }, + { + "title": "xupa-rustam", + "url": "/article?view=xupa-rustam-2080", + "description": "Python based Pentesting Brute-Force tool to crack username and password of a simple traditional website ", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/xupa-rustam", + "tag": "Python" + }, + { + "title": "PhantomBlitz", + "url": "/article?view=phantomblitz-2080", + "description": "PhantomBlitz: Yet another tool for reverse shell execution & payload generator by Dev. Gautam Kumar ", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/PhantomBlitz", + "tag": "Python" + }, + { + "title": "unvetion", + "url": "/article?view=unvetion-2080", + "description": "MINI RECON PROJECT.", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/unvetion", + "tag": "Python" + }, + { + "title": "Common Techniques & Software ", + "url": "/article?view=common-techniques-n-software-2080", + "description": "List of common T1 and SO(s) used by Threat groups.", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/common-techniques-n-software", + "tag": "Markdown" + }, + { + "title": "WebSecProbe", + "url": "/article?view=webSecProbe-2080", + "description": "Web Application Vulnerability Scanning using Python and browser automation libraries allowing efficient scanning of web application.", + "content": "loading...", + "featured": "false", + "image_url": "N/A", + "github_link": "https://github.com/Krimson-Squad/WebSecProbe", + "tag": "Python" + }, + { + "title":"ShadowCipher", + "url":"/article?view=shadow-cipher-2080", + "description":"A simple tool that allows you to generate wordlists based on first and last names. It provides various patterns and variations to create a wide range of potential words for password cracking, data analysis, or other purposes. ", + "content":"loading...", + "featured":"false", + "image_url":"N/A", + "github_link":"https://github.com/Krimson-Squad/ShadowCipher", + "tag":"Python" + } + ] +} \ No newline at end of file diff --git a/index.html b/index.html index 3eb051e..8f5c2cc 100644 --- a/index.html +++ b/index.html @@ -7,7 +7,7 @@ - +
@@ -25,16 +25,16 @@ @@ -42,49 +42,9 @@

Recent H
-
+
-
-
-

PHP

-

AndherNagri

-

A vulnerable site to practice XSS and SQL injection.

- Learn More - - - - - -
-
- -
-
-

PYTHON

-

xupa-rustam

-

Python based Pentesting Brute-Force tool to crack username and password of a simple traditional website

- Learn More - - - - - -
-
- -
-
-

PYTHON

-

PhantomBlitz

-

PhantomBlitz: Yet another tool for reverse shell execution & payload generator by Dev. Gautam Kumar

- Learn More - - - - - -
-
+
@@ -124,4 +84,5 @@

PhantomB

+ \ No newline at end of file