Youtube Channel Website

Overview

Youtube-Page-Generator

Videos-By-Sanjeevi

Youtube Channel Website

YouTube Channel Website Features:

  1. Free Hosting using GitHub Pages and open-source code base in GitHub.
  2. It can update all the videos, title, and description available inside the channel into the website everyday automatically using the GitHub Actions feature.
  3. No need to manually do any step after posting any new video in YouTube, it will be updated in website on next day.

How to Reuse this Template which creates a personal website hosted in Github Pages using Jekyll and Github Actions for free!

  1. Fork this repo: Fork this on github

  2. Create Secret in Github repo and add secret named: "GOOGLEAPIKEY" with value of Google console api id.

  3. Update your channel name in the file workflow - File line : 18

    python ./youtubeChannelVideosFinder.py -k ${{ secrets.GOOGLEAPIKEY }} -c 'your-channel-name-here' --output-file-path index.md

  4. Enable the repo as github pages, your website is ready.

Samples created by this tool:

https://github.com/LKG-in-IT/YoutubeChannelWebsite

Demo 1:

https://lkg-in-it.github.io/YoutubeChannelWebsite/

Demo 2:

https://ssanjeevi.github.io/YoutubeChannelWebsite/

Demo 3

https://tnpscquickies.github.io/YoutubeChannelWebsite/

Detailed Article:

https://lkgforit.com/personal-youtube-channel-videos-website-hosted-in-github-pages-for-free-which-populates-content-by-itself

Reference:

https://github.com/dsebastien/youtubeChannelVideosFinder

https://github.com/nathancy/jekyll-embed-video

Comments
  • Configure WhiteSource Bolt for GitHub

    Configure WhiteSource Bolt for GitHub

    Welcome to WhiteSource Bolt for GitHub! This is an onboarding PR to help you understand and configure settings before WhiteSource starts scanning your repository for security vulnerabilities.

    :vertical_traffic_light: WhiteSource Bolt for GitHub will start scanning your repository only once you merge this Pull Request. To disable WhiteSource Bolt for GitHub, simply close this Pull Request.


    What to Expect

    This PR contains a '.whitesource' configuration file which can be customized to your needs. If no changes were applied to this file, WhiteSource Bolt for GitHub will use the default configuration.

    Before merging this PR, Make sure the Issues tab is enabled. Once you merge this PR, WhiteSource Bolt for GitHub will scan your repository and create a GitHub Issue for every vulnerability detected in your repository.

    If you do not want a GitHub Issue to be created for each detected vulnerability, you can edit the '.whitesource' file and set the 'minSeverityLevel' parameter to 'NONE'.


    :question: Got questions? Check out WhiteSource Bolt for GitHub docs. If you need any further assistance then you can also request help here.

    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 - Medium Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website.

    Publish Date: 2021-02-11

    URL: CVE-2021-22881

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130

    Release Date: 2021-02-11

    Fix Resolution: 6.0.3.5,6.1.2.1


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 - Medium Severity Vulnerability

    Vulnerable Library - actionview-6.0.2.2.gem

    Simple, battle-tested conventions and helpers for building web pages.

    Library home page: https://rubygems.org/gems/actionview-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • actionpack-6.0.2.2.gem
            • :x: actionview-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the t and translate helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.

    Publish Date: 2020-09-11

    URL: CVE-2020-15169

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://rubygems.org/gems/actionview/versions/6.0.3.3

    Release Date: 2020-07-21

    Fix Resolution: 6.0.3.3, 5.2.4.4


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

    Publish Date: 2020-04-29

    URL: CVE-2020-11022

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

    Release Date: 2020-04-29

    Fix Resolution: jQuery - 3.5.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 - High Severity Vulnerability

    Vulnerable Library - addressable-2.7.0.gem

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. It is flexible, offers heuristic parsing, and additionally provides extensive support for IRIs and URI templates.

    Library home page: https://rubygems.org/gems/addressable-2.7.0.gem

    Dependency Hierarchy:

    • jekyll-archives-2.2.1.gem (Root Library)
      • jekyll-4.2.0.gem
        • :x: addressable-2.7.0.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

    Publish Date: 2021-07-06

    URL: CVE-2021-32740

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g

    Release Date: 2021-07-06

    Fix Resolution: addressable - 2.8.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing

    Publish Date: 2020-04-29

    URL: CVE-2020-11023

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440

    Release Date: 2020-04-29

    Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 - High Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses authenticate_or_request_with_http_token or authenticate_with_http_token for request authentication.

    Publish Date: 2021-06-11

    URL: CVE-2021-22904

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/rubysec/ruby-advisory-db/commit/691f9dce9b6ff8f4e9dec8ea459b66c0b7037dac

    Release Date: 2021-01-07

    Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
Releases(Release0.1.2)
Owner
Sanjeevi Subramani
Sanjeevi Subramani
Syarat.ID Source Code - Syarat.ID is a content aggregator website

Syarat.ID is a content aggregator website that gathering all informations with the specific keyword: "syarat" from the internet.

Syarat.ID 2 Oct 15, 2021
Headless - Wrapper around Ghidra's analyzeHeadless script

Wrapper around Ghidra's analyzeHeadless script, could be helpful to some? Don't tell me anything is wrong with it, it works on my machine.

8 Oct 29, 2022
Un script en python qui permet d'automatique bumpée (disboard.org) tout les 2h

auto-bumper Un script en python qui permet d'automatique bumpée (disboard.org) tout les 2h Pour la première utilisation, 1.Lancer Install.bat 2.(faire

!! 1 Jan 09, 2022
Demo content - Automate your automation!

Automate-AAP2 Demo Content - Automate your automation! A fully automated Ansible Automation Platform. Context Installing and configuring Ansible Autom

0 Oct 27, 2022
Slimbook Battery 4 is the new version with new features that improves battery control and increases battery duration in laptops.

Slimbookbattery Slimbook Battery 4 is the new version with new features that improves battery control and increases battery duration in laptops. This

SLIMBOOK TEAM 128 Dec 28, 2022
SimBiber - A tool for simplifying bibtex with official info

SimBiber: A tool for simplifying bibtex with official info. We often need to sim

336 Jan 02, 2023
Painel simples com consulta de cep,CNPJ,placa e ip

Painel mpm Um painel simples com consultas de IP, CNPJ, CEP e PLACA Início 🌐 apt update && apt upgrade -y pkg i python git pip install requests Insta

8 Feb 27, 2022
Exercise to teach a newcomer to the CLSP grid to set up their environment and run jobs

Exercise to teach a newcomer to the CLSP grid to set up their environment and run jobs

Alexandra 2 May 18, 2022
Modern API wrapper for Genshin Impact built on asyncio and pydantic.

genshin.py Modern API wrapper for Genshin Impact built on asyncio and pydantic.

sadru 212 Jan 06, 2023
Convert a .vcf file to 'aa_table.tsv', including depth & alt frequency info

Produce an 'amino acid table' file from a vcf, including depth and alt frequency info.

Dan Fornika 1 Oct 16, 2021
OB_Template is a vault template reference for using Obsidian.

Obsidian Template OB_Template is a vault template reference for using Obsidian. If you've tested out Obsidian. and worked through the "Obsidian Help"

323 Dec 27, 2022
AutoMetamon: Simple program to play Metamon automatically

AutoMetamon: Simple program to play Metamon automatically

Ngô Văn Tuấn 2 Sep 13, 2022
kurwa deska ADB

kurwa-deska-ADB kurwa-deska Запуск Linux -- python3 kurwa_deska.py Termux -- python3 kurwa_deska.py Встановлення cd kurwa_deska ADB і зразу запуск pyt

1 Jan 21, 2022
A basic DIY-project made using Python and MySQL

Banking-Using-Python-MySQL This is a basic DIY-project made using Python and MySQL. Pre-Requisite needed:-- MySQL command Line:- creating a database

ABHISHEK 0 Jul 03, 2022
An AddOn storing wireguard configuration

Wireguard Database Connector Overview Development Status: 0.1.7 (alpha) First of all, I'd like to thank Jared McKnight for wireguard who inspired me t

Markus Neubauer 3 Dec 30, 2021
Academic planner application designed for students and counselors.

Academic planner application designed for students and counselors.

Ali bagheri 2 Dec 31, 2021
reproduces experiments from

Installation To enable importing of modules, from the parent directory execute: pip install -e . To install requirements: python -m pip install requir

Meta Research 15 Aug 11, 2022
Covid-ml-predictors - COVID predictions using AI.

COVID Predictions This repo contains ML models to be trained on COVID-19 data from the UK, sourced off of Kaggle here. This uses many different ML mod

1 Jan 09, 2022
Versión preliminar análisis general de Covid-19 en Colombia

Covid_Colombia_v09 Versión: Python 3.8.8 1/ La base de datos del Ministerio de Salud (Minsalud Colombia) está en https://www.datos.gov.co/Salud-y-Prot

Julián Gómez 1 Jan 30, 2022
NasaApod - Astronomy Picture of the Day

Astronomy Picture of the Day Get interesting Astronomical pictures with a brief

Shripad Rao 1 Feb 15, 2022