Youtube Channel Website

Overview

Youtube-Page-Generator

Videos-By-Sanjeevi

Youtube Channel Website

YouTube Channel Website Features:

  1. Free Hosting using GitHub Pages and open-source code base in GitHub.
  2. It can update all the videos, title, and description available inside the channel into the website everyday automatically using the GitHub Actions feature.
  3. No need to manually do any step after posting any new video in YouTube, it will be updated in website on next day.

How to Reuse this Template which creates a personal website hosted in Github Pages using Jekyll and Github Actions for free!

  1. Fork this repo: Fork this on github

  2. Create Secret in Github repo and add secret named: "GOOGLEAPIKEY" with value of Google console api id.

  3. Update your channel name in the file workflow - File line : 18

    python ./youtubeChannelVideosFinder.py -k ${{ secrets.GOOGLEAPIKEY }} -c 'your-channel-name-here' --output-file-path index.md

  4. Enable the repo as github pages, your website is ready.

Samples created by this tool:

https://github.com/LKG-in-IT/YoutubeChannelWebsite

Demo 1:

https://lkg-in-it.github.io/YoutubeChannelWebsite/

Demo 2:

https://ssanjeevi.github.io/YoutubeChannelWebsite/

Demo 3

https://tnpscquickies.github.io/YoutubeChannelWebsite/

Detailed Article:

https://lkgforit.com/personal-youtube-channel-videos-website-hosted-in-github-pages-for-free-which-populates-content-by-itself

Reference:

https://github.com/dsebastien/youtubeChannelVideosFinder

https://github.com/nathancy/jekyll-embed-video

Comments
  • Configure WhiteSource Bolt for GitHub

    Configure WhiteSource Bolt for GitHub

    Welcome to WhiteSource Bolt for GitHub! This is an onboarding PR to help you understand and configure settings before WhiteSource starts scanning your repository for security vulnerabilities.

    :vertical_traffic_light: WhiteSource Bolt for GitHub will start scanning your repository only once you merge this Pull Request. To disable WhiteSource Bolt for GitHub, simply close this Pull Request.


    What to Expect

    This PR contains a '.whitesource' configuration file which can be customized to your needs. If no changes were applied to this file, WhiteSource Bolt for GitHub will use the default configuration.

    Before merging this PR, Make sure the Issues tab is enabled. Once you merge this PR, WhiteSource Bolt for GitHub will scan your repository and create a GitHub Issue for every vulnerability detected in your repository.

    If you do not want a GitHub Issue to be created for each detected vulnerability, you can edit the '.whitesource' file and set the 'minSeverityLevel' parameter to 'NONE'.


    :question: Got questions? Check out WhiteSource Bolt for GitHub docs. If you need any further assistance then you can also request help here.

    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 - Medium Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website.

    Publish Date: 2021-02-11

    URL: CVE-2021-22881

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130

    Release Date: 2021-02-11

    Fix Resolution: 6.0.3.5,6.1.2.1


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 - Medium Severity Vulnerability

    Vulnerable Library - actionview-6.0.2.2.gem

    Simple, battle-tested conventions and helpers for building web pages.

    Library home page: https://rubygems.org/gems/actionview-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • actionpack-6.0.2.2.gem
            • :x: actionview-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the t and translate helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.

    Publish Date: 2020-09-11

    URL: CVE-2020-15169

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://rubygems.org/gems/actionview/versions/6.0.3.3

    Release Date: 2020-07-21

    Fix Resolution: 6.0.3.3, 5.2.4.4


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

    Publish Date: 2020-04-29

    URL: CVE-2020-11022

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

    Release Date: 2020-04-29

    Fix Resolution: jQuery - 3.5.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 - High Severity Vulnerability

    Vulnerable Library - addressable-2.7.0.gem

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. It is flexible, offers heuristic parsing, and additionally provides extensive support for IRIs and URI templates.

    Library home page: https://rubygems.org/gems/addressable-2.7.0.gem

    Dependency Hierarchy:

    • jekyll-archives-2.2.1.gem (Root Library)
      • jekyll-4.2.0.gem
        • :x: addressable-2.7.0.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

    Publish Date: 2021-07-06

    URL: CVE-2021-32740

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g

    Release Date: 2021-07-06

    Fix Resolution: addressable - 2.8.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing

    Publish Date: 2020-04-29

    URL: CVE-2020-11023

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440

    Release Date: 2020-04-29

    Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 - High Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses authenticate_or_request_with_http_token or authenticate_with_http_token for request authentication.

    Publish Date: 2021-06-11

    URL: CVE-2021-22904

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/rubysec/ruby-advisory-db/commit/691f9dce9b6ff8f4e9dec8ea459b66c0b7037dac

    Release Date: 2021-01-07

    Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
Releases(Release0.1.2)
Owner
Sanjeevi Subramani
Sanjeevi Subramani
The official FOSSCOMM 2021 CTF by [email protected]

FOSSCOMM 2021 CTF Table of Contents General Info FAQ General Info Purpose: This CTF is a collaboration between the FOSSCOMM conference and the Machina 2 Nov 14, 2021

This simple script generates a backup of a given Python and R environment

Python Environment Backup It’s always good to maintain your Python and R Anaconda environment packages properly listed and well-kept in case you have

Andrew Laganaro 1 Jul 13, 2022
Pengenalan para anggota KOMPETEGRAM

Pengenalan Anggota KOMPETEGRAM Apa isi repositori ini ? 💬 Repositori ini berisi pengenalan nama anggota KOMPETEGRAM dari seluruh angkatan atau Batch.

Repositori KOMPETEGRAM 7 Sep 17, 2022
A Desktop application for the signalum python library

Signalum Desktop A Desktop application on the Signalum Python Library/CLI Tool. The Signalum Desktop application is an attempt to develop a single too

BISOHNS 35 Feb 15, 2021
Beancount Importers for DKB (Deutsche Kredit Bank) CSV Exports

Beancount DKB Importer beancount-dkb provides an Importer for converting CSV exports of DKB (Deutsche Kreditbank) account summaries to the Beancount f

Siddhant Goel 24 Aug 06, 2022
Simulation simplifiée du fonctionnement du protocole RIP

ProjetRIPlay v2 Simulation simplifiée du fonctionnement du protocole RIP par Eric Buonocore le 18/01/2022 Sur la base de l'exercice 5 du sujet zéro du

Eric Buonocore 2 Feb 15, 2022
Play tic-tac-toe in PowerPoint

The presentation has around 6,000 slides representing every possible game state (and some impossible ones, since I didn't check for wins or ties). You play by clicking on the squares, which are hyper

Jesse Li 3 Dec 18, 2021
Standard mutable string (character array) implementation for Python.

chararray A standard mutable character array implementation for Python.

Tushar Sadhwani 3 Dec 18, 2021
Code for the manim-generated scenes used in 3blue1brown videos

This project contains the code used to generate the explanatory math videos found on 3Blue1Brown. This almost entirely consists of scenes generated us

Grant Sanderson 4.1k Jan 02, 2023
Research using python - Guide for development of research code (using Anaconda Python)

Guide for development of research code (using Anaconda Python) TL;DR: One time s

Ziv Yaniv 1 Feb 01, 2022
Another Provably Rare Gem Miner 💎 (for Raritygems)

Provably Rare Gem Miner Go (for Rarity) Pull Request is strongly welcome as I don't know anything about Golang/Python/Web3. Usage Install Python 3.x i

朱里 6 Apr 22, 2022
DeDRM tools for ebooks

DeDRM_tools DeDRM tools for ebooks This is a fork of Apprentice Harper's version of the DeDRM tools. I've added some of the PRs that still haven't bee

2 Jan 10, 2022
Return-Parity-MDP - Towards Return Parity in Markov Decision Processes

Towards Return Parity in Markov Decision Processes Code for the AISTATS 2022 pap

Jianfeng Chi 3 Nov 27, 2022
Automates the fixing of problems reported by yamllint by parsing its output

yamlfixer yamlfixer automates the fixing of problems reported by yamllint by parsing its output. Usage This software automatically fixes some errors a

OPT Nouvelle Caledonie 26 Dec 26, 2022
oracle arm registration script.

oracle_arm oracle arm registration script. 乌龟壳刷ARM脚本 本脚本优点 简单,主机配置好oci,然后下载main.tf即可,不用自己获取各种参数。 运行环境配置 本简单脚本使用python3编写,请自行配置好python3环境和requests库。(高版

test1234455 419 Jan 01, 2023
Automation in socks label validation

This is a project for socks card label validation where the socks card is validated comparing with the correct socks card whose coordinates are stored in the database. When the test socks card is com

1 Jan 19, 2022
NCAR/UCAR virtual Python Tutorial Seminar Series lesson on MetPy.

The Project Pythia Python Tutorial Seminar Series continues with a lesson on MetPy on Wednesday, 2 February 2022 at 1 PM Mountain Standard Time.

Project Pythia Tutorials 6 Oct 09, 2022
Supply Chain will be a SAAS platfom to provide e-logistic facilites with most optimal

Shipp It Welcome To Supply Chain App [ Shipp It ] In "Shipp It" we are creating a full solution[web+app] for a entire supply chain from receiving orde

SAIKAT_CLAW 25 Dec 26, 2022
[x]it! support for working with todo and check list files in Sublime Text

[x]it! for Sublime Text This Sublime Package provides syntax-highlighting, shortcuts, and auto-completions for [x]it! files. Features Syntax highlight

Jan Heuermann 18 Sep 19, 2022
Python-Kite: Simple python code to make kite pattern

Python-Kite Simple python code to make kite pattern. Getting Started These instr

Anoint 0 Mar 22, 2022