Youtube Channel Website

Overview

Youtube-Page-Generator

Videos-By-Sanjeevi

Youtube Channel Website

YouTube Channel Website Features:

  1. Free Hosting using GitHub Pages and open-source code base in GitHub.
  2. It can update all the videos, title, and description available inside the channel into the website everyday automatically using the GitHub Actions feature.
  3. No need to manually do any step after posting any new video in YouTube, it will be updated in website on next day.

How to Reuse this Template which creates a personal website hosted in Github Pages using Jekyll and Github Actions for free!

  1. Fork this repo: Fork this on github

  2. Create Secret in Github repo and add secret named: "GOOGLEAPIKEY" with value of Google console api id.

  3. Update your channel name in the file workflow - File line : 18

    python ./youtubeChannelVideosFinder.py -k ${{ secrets.GOOGLEAPIKEY }} -c 'your-channel-name-here' --output-file-path index.md

  4. Enable the repo as github pages, your website is ready.

Samples created by this tool:

https://github.com/LKG-in-IT/YoutubeChannelWebsite

Demo 1:

https://lkg-in-it.github.io/YoutubeChannelWebsite/

Demo 2:

https://ssanjeevi.github.io/YoutubeChannelWebsite/

Demo 3

https://tnpscquickies.github.io/YoutubeChannelWebsite/

Detailed Article:

https://lkgforit.com/personal-youtube-channel-videos-website-hosted-in-github-pages-for-free-which-populates-content-by-itself

Reference:

https://github.com/dsebastien/youtubeChannelVideosFinder

https://github.com/nathancy/jekyll-embed-video

Comments
  • Configure WhiteSource Bolt for GitHub

    Configure WhiteSource Bolt for GitHub

    Welcome to WhiteSource Bolt for GitHub! This is an onboarding PR to help you understand and configure settings before WhiteSource starts scanning your repository for security vulnerabilities.

    :vertical_traffic_light: WhiteSource Bolt for GitHub will start scanning your repository only once you merge this Pull Request. To disable WhiteSource Bolt for GitHub, simply close this Pull Request.


    What to Expect

    This PR contains a '.whitesource' configuration file which can be customized to your needs. If no changes were applied to this file, WhiteSource Bolt for GitHub will use the default configuration.

    Before merging this PR, Make sure the Issues tab is enabled. Once you merge this PR, WhiteSource Bolt for GitHub will scan your repository and create a GitHub Issue for every vulnerability detected in your repository.

    If you do not want a GitHub Issue to be created for each detected vulnerability, you can edit the '.whitesource' file and set the 'minSeverityLevel' parameter to 'NONE'.


    :question: Got questions? Check out WhiteSource Bolt for GitHub docs. If you need any further assistance then you can also request help here.

    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 (Medium) detected in actionpack-6.0.2.2.gem

    CVE-2021-22881 - Medium Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted Host headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted Host header can be used to redirect to a malicious website.

    Publish Date: 2021-02-11

    URL: CVE-2021-22881

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130

    Release Date: 2021-02-11

    Fix Resolution: 6.0.3.5,6.1.2.1


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 (Medium) detected in actionview-6.0.2.2.gem

    CVE-2020-15169 - Medium Severity Vulnerability

    Vulnerable Library - actionview-6.0.2.2.gem

    Simple, battle-tested conventions and helpers for building web pages.

    Library home page: https://rubygems.org/gems/actionview-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • actionpack-6.0.2.2.gem
            • :x: actionview-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the t and translate helpers could be susceptible to XSS attacks. When an HTML-unsafe string is passed as the default for a missing translation key named html or ending in _html, the default string is incorrectly marked as HTML-safe and not escaped. This is patched in versions 6.0.3.3 and 5.2.4.4. A workaround without upgrading is proposed in the source advisory.

    Publish Date: 2020-09-11

    URL: CVE-2020-15169

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://rubygems.org/gems/actionview/versions/6.0.3.3

    Release Date: 2020-07-21

    Fix Resolution: 6.0.3.3, 5.2.4.4


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11022 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.

    Publish Date: 2020-04-29

    URL: CVE-2020-11022

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

    Release Date: 2020-04-29

    Fix Resolution: jQuery - 3.5.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 (High) detected in addressable-2.7.0.gem

    CVE-2021-32740 - High Severity Vulnerability

    Vulnerable Library - addressable-2.7.0.gem

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. It is flexible, offers heuristic parsing, and additionally provides extensive support for IRIs and URI templates.

    Library home page: https://rubygems.org/gems/addressable-2.7.0.gem

    Dependency Hierarchy:

    • jekyll-archives-2.2.1.gem (Root Library)
      • jekyll-4.2.0.gem
        • :x: addressable-2.7.0.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.

    Publish Date: 2021-07-06

    URL: CVE-2021-32740

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g

    Release Date: 2021-07-06

    Fix Resolution: addressable - 2.8.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 (Medium) detected in jquery-3.3.1.min.js

    CVE-2020-11023 - Medium Severity Vulnerability

    Vulnerable Library - jquery-3.3.1.min.js

    JavaScript library for DOM operations

    Library home page: https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js

    Path to dependency file: YoutubeChannelWebsite/_includes/scripts.html

    Path to vulnerable library: /_includes/scripts.html

    Dependency Hierarchy:

    • :x: jquery-3.3.1.min.js (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing

    Publish Date: 2020-04-29

    URL: CVE-2020-11023

    CVSS 3 Score Details (6.1)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: Required
      • Scope: Changed
    • Impact Metrics:
      • Confidentiality Impact: Low
      • Integrity Impact: Low
      • Availability Impact: None

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6,https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#440

    Release Date: 2020-04-29

    Fix Resolution: jquery - 3.5.0;jquery-rails - 4.4.0


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
  • CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 (High) detected in actionpack-6.0.2.2.gem

    CVE-2021-22904 - High Severity Vulnerability

    Vulnerable Library - actionpack-6.0.2.2.gem

    Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

    Library home page: https://rubygems.org/gems/actionpack-6.0.2.2.gem

    Dependency Hierarchy:

    • bootstrap-4.4.1.gem (Root Library)
      • sassc-rails-2.1.2.gem
        • sprockets-rails-3.2.1.gem
          • :x: actionpack-6.0.2.2.gem (Vulnerable Library)

    Found in HEAD commit: 236664cbc5769870ab2bcbeffd6a5aab5b9ad230

    Found in base branch: gh-pages

    Vulnerability Details

    The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses authenticate_or_request_with_http_token or authenticate_with_http_token for request authentication.

    Publish Date: 2021-06-11

    URL: CVE-2021-22904

    CVSS 3 Score Details (7.5)

    Base Score Metrics:

    • Exploitability Metrics:
      • Attack Vector: Network
      • Attack Complexity: Low
      • Privileges Required: None
      • User Interaction: None
      • Scope: Unchanged
    • Impact Metrics:
      • Confidentiality Impact: None
      • Integrity Impact: None
      • Availability Impact: High

    For more information on CVSS3 Scores, click here.

    Suggested Fix

    Type: Upgrade version

    Origin: https://github.com/rubysec/ruby-advisory-db/commit/691f9dce9b6ff8f4e9dec8ea459b66c0b7037dac

    Release Date: 2021-01-07

    Fix Resolution: actionpack - 5.2.4.6,5.2.6,6.0.3.7,6.1.3.2


    Step up your Open Source Security Game with WhiteSource here

    security vulnerability 
    opened by mend-bolt-for-github[bot] 0
Releases(Release0.1.2)
Owner
Sanjeevi Subramani
Sanjeevi Subramani
Add any Program in any language you like or add a hello world Program ❣️ if you like give us :star:

Welcome to the Hacktoberfest 2018 Hello-world 📋 This Project aims to help you to get started with using Github. You can find a tutorial here What is

Aniket Sharma 1.5k Nov 16, 2022
A Way to Use Python, Easier.

PyTools A Way to Use Python, Easier. How to Install Just copy this code, then make a new file in your project directory called PyTools.py, then paste

Kamran 2 Aug 15, 2022
Ssma is a tool that helps you collect your badges in a satr platform

satr-statistics-maker ssma is a tool that helps you collect your badges in a satr platform 🎖️ Requirements python = 3.7 Installation first clone the

TheAwiteb 3 Jan 04, 2022
The little-endian version of MessagePack

MessagePackEL This is the little-endian version of MessagePack, except the endianness is different, the rest is exactly the same as MessagePack. C lib

dukelec 9 May 13, 2022
Collection of Beginner to Intermediate level Python scripts contributed by members and participants.

Hacktoberfest2021-Python Hello there! This repository contains a 'Collection of Beginner to Intermediate level Python projects', created specially for

12 May 25, 2022
Would upload anything I do with/related to brainfuck

My Brainfu*k Repo Basically wanted to create something with Brainfu*k but realized that with the smol brain I have, I need to see the cell values real

Rafeed 1 Mar 22, 2022
Cisco IOS-XE Operations Program. Shows operational data using restconf and yang

XE-Ops View operational and config data from devices running Cisco IOS-XE software. NoteS The build folder is the latest build. All other files are fo

18 Jul 23, 2022
Algo próximo do ARP

ArpPY Algo parecido com o ARP-Scan. Dependencias O script necessita no mínimo ter o Python versão 3.x instalado e ter o sockets instalado. Executando

Feh's 3 Jan 18, 2022
MIB2 STD ZR Firmware Upgrade

Upgrade MIB2 STD ZR Firmware (without Navigation) About This repository contains some scripts and documentation how to upgrade the MIB2 firmware to a

Fabian 18 Dec 29, 2022
It is Keqin Wang first project in CMU, trying to use DRL(PPO) to control a 5-dof manipulator to draw line in space.

5dof-robot-writing this project aim to use PPO control a 5 dof manipulator to draw lines in 3d space. Introduction to the files the pybullet environme

Keqin Wang 4 Aug 22, 2022
Check a discord message and give it a percentage of scamminess

scamChecker Check a discord message and give it a percentage of scamminess Run the bot, and run the command !scamCheck and it will return a percentage

3 Sep 22, 2022
A Python Perforce package that doesn't bring in any other packages to work.

P4CMD 🌴 A Python Perforce package that doesn't bring in any other packages to work. Relies on p4cli installed on the system. p4cmd The p4cmd module h

Niels Vaes 13 Dec 19, 2022
Sample python script for monitoring Rocketchat database and get statistics of users.

rocketchat-DB-monitoring Sample python script for monitoring Rocketchat database and get statistics of users. 1. Update python: yum check-update && yu

Mojtaba Taleghani 1 Apr 12, 2022
Explore-bikeshare-data - GitHub project as part of the Programming for Data Science with Python Nanodegree from Udacity

Date created February 10, 2022 Project Title Explore US Bikeshare Data Descripti

Thárcyla 1 Feb 14, 2022
An app that mirrors your phone to your compute and maps controller input to the screen

What is 'Dragalia Control'? An app that mirrors your phone to your compute and maps controller input to the screen. Inputs are mapped specifically for

1 May 03, 2022
Small scripts to learn about GNOME internals

gnome-hacks This is a collection of APIs that allow programmatic manipulation of the GNOME shell. If you use GNOME (the default graphical shell in Ubu

Alex Nichol 5 Oct 22, 2021
Blender addon to import images as meshes

ImagesAsMesh Blender addon to import images as meshes. Inspired by: ImagesAsPlanes Installation It's like just about every other Blender addon. Downlo

Niccolo Zuppichini 4 Jan 04, 2022
Larvamatch - Find your larva or punk match.

LarvaMatch Find your larva or punk match. UI TBD API (not started) The API will allow you to specify a punk by token id to find a larva match, and vic

1 Jan 02, 2022
A multi-platform fuzzer for poking at userland binaries and servers

litefuzz A multi-platform fuzzer for poking at userland binaries and servers litefuzz intro why how it works what it does what it doesn't do support p

52 Nov 18, 2022
A clock widget for linux ez to use no need for cmd line ;)

A clock widget in LINUX A clock widget for linux ez to use no need for cmd line ;) How to install? oh its ez just go to realese! what are the paltform

1 Feb 15, 2022