Skip to content

Commit

Permalink
Update _index.md
Browse files Browse the repository at this point in the history
  • Loading branch information
x86phil authored May 15, 2024
1 parent ff53abf commit d35f32e
Showing 1 changed file with 22 additions and 16 deletions.
38 changes: 22 additions & 16 deletions content/en/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,30 +22,36 @@ title: threathunter.io
<div class="container">
<div class="row">
<div class="col-lg-4">
<div class="card-shadow" style="display: flex; align-items: flex-start; padding: 10px;">
<i class="fa-solid fa-clipboard" style="font-size: 50px; margin-right: 30px;"></i>
<h4 class="section-text-bold">Notes</h4>
<p class="section-text">
The 'Notes' section serves as a repository for technical write-ups and detailed descriptions of technical internals. These notes provide in-depth insights into complex systems, technologies, and processes, offering valuable knowledge and understanding for security professionals and enthusiasts alike. Whether you're a seasoned security expert seeking to deepen your understanding or a newcomer looking to explore the intricacies of cybersecurity, the 'Notes' section offers a wealth of information to enhance your expertise and broaden your perspective.
</p>
<div class="card-shadow">
<div style="flex: 0 0 50%; display: flex; align-items: top; padding: 10px;">
<i class="fa-solid fa-clipboard" style="font-size: 50px; margin-right: 30px;"></i>
<div style="flex: 1; text-align: justify;">
<h2>Notes</h2>
<p>The 'Notes' section serves as a repository for technical write-ups and detailed descriptions of technical internals. These notes provide in-depth insights into complex systems, technologies, and processes, offering valuable knowledge and understanding for security professionals and enthusiasts alike. Whether you're a seasoned security expert seeking to deepen your understanding or a newcomer looking to explore the intricacies of cybersecurity, the 'Notes' section offers a wealth of information to enhance your expertise and broaden your perspective.</p>
</div>
</div>
</div>
</div>
<div class="col-lg-4">
<div class="card-shadow" style="display: flex; align-items: flex-start; padding: 10px;">
<div class="card-shadow">
<div style="flex: 0 0 50%; display: flex; align-items: top; padding: 10px;">
<i class="fa-solid fa-gear" style="font-size: 50px; margin-right: 30px;"></i>
<h4 class="section-text-bold">Tools</h4>
<p class="section-text">
The 'Tools' section serves as a public software repository, offering a diverse range of tools, libraries, and resources for security professionals and enthusiasts. This collection provides valuable resources to enhance cybersecurity practices and facilitate security research.
</p>
<div style="flex: 1; text-align: justify;">
<h2>Tools</h2>
<p>The 'Tools' section serves as a public software repository, offering a diverse range of tools, libraries, and resources for security professionals and enthusiasts. This collection provides valuable resources to enhance cybersecurity practices and facilitate security research.</p>
</div>
</div>
</div>
</div>
<div class="col-lg-4">
<div class="card-shadow" style="display: flex; align-items: flex-start; padding: 10px;">
<div class="card-shadow">
<div style="flex: 0 0 50%; display: flex; align-items: top; padding: 10px;">
<i class="fa-brands fa-blogger" style="font-size: 50px; margin-right: 30px;"></i>
<h4 class="section-text-bold">Blog</h4>
<p class="section-text">
The 'Blog' section features insightful articles, analysis, and commentary on various topics related to cybersecurity, incident response, threat hunting, and more. Stay informed about the latest trends, best practices, and emerging technologies in the ever-evolving field of cybersecurity through our engaging and informative blog posts.
</p>
<div style="flex: 1; text-align: justify;">
<h2>Blog</h2>
<p>The 'Blog' section features insightful articles, analysis, and commentary on various topics related to cybersecurity, incident response, threat hunting, and more. Stay informed about the latest trends, best practices, and emerging technologies in the ever-evolving field of cybersecurity through our engaging and informative blog posts.</p>
</div>
</div>
</div>
</div>
</div>
Expand Down

0 comments on commit d35f32e

Please sign in to comment.