Skip to content
View franlrs's full-sized avatar

Block or report franlrs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
franlrs/README.md
fran@server:~$ cat profile.json
{
  "role": "Computer Engineering Student | Aspiring Security Analyst",
  "focus": [
    "Ethical Hacking & System Hardening",
    "Web Exploitation & Security Auditing",
    "Self-Hosted Infrastructure & Homelabs"
  ],
  "environments": [
    "VirtualBox with Kali Linux (Laptop)",
    "VMWare with custom Kali Linux BSPWM (Desktop)"
  ],
  "mindset": "Understanding technology from the kernel up",
  "currently_studying": "eJPT v2 Certification"
}
fran@server:~$ _

Main Control Unit

Linux, Python, Bash, C++, AWS, Git
Docker, Nginx, Arduino, Raspberry Pi, VSCode, Cloudflare
Wireshark Badge   Portainer Badge

[ Python | Bash | C++ | Kali Linux | Docker | Nginx | Raspberry Pi | AWS | Wireshark | Portainer ]


Projects
Security Audits, Homelab & IoT

Documenting full-chain security audits (wp-pie-exploit) and web exploitation. Building self-hosted environments (Nextcloud, DNS-Guard) on Raspberry Pi bypassing CGNAT. Developing Python stealth network scanners and IoT security systems (esp32-motion-alarm) using microcontrollers.

Education
Education & Write-ups

Computer Engineering student driven to understand technology from the kernel up. Active in DockerLabs with published write-ups on CVEs, privilege escalation, and web vulnerabilities. Developing adaptability and resilience through international multicultural experiences.


GitHub Metrics

Pinned Loading

  1. xss-exploit-chain xss-exploit-chain Public

    Security assessment showcasing how simple input validation failures in a corporate social network lead to full administrative compromise and unauthorized treasury access.

    JavaScript 2

  2. wp-pie-exploit wp-pie-exploit Public

    A full-chain security audit demonstrating how everyday vulnerabilities like forgotten WordPress plugin updates, hardcoded plaintext secrets, and password reuse can escalate into a complete root ser…

    PHP 1

  3. stealth-scanner stealth-scanner Public

    A high-performance, containerized TCP SYN Port Scanner built with Python and Scapy for stealth network reconnaissance.

    Python 1

  4. nextcloud-rpi nextcloud-rpi Public

    Self-hosted private cloud infrastructure on Raspberry Pi 5 using Docker Compose, MariaDB & Tailscale implementation for CGNAT bypass.

    1

  5. dns-guard dns-guard Public

    Self-hosted Network-wide Ad Blocking & Recursive DNS Resolver using Docker Compose. Includes documentation for restrictive ISP environments (University Dorms/CGNAT).

    1