|
fran@server:~$ cat profile.json { "role": "Computer Engineering Student | Aspiring Security Analyst", "focus": [ "Ethical Hacking & System Hardening", "Web Exploitation & Security Auditing", "Self-Hosted Infrastructure & Homelabs" ], "environments": [ "VirtualBox with Kali Linux (Laptop)", "VMWare with custom Kali Linux BSPWM (Desktop)" ], "mindset": "Understanding technology from the kernel up", "currently_studying": "eJPT v2 Certification" } fran@server:~$ _ |
Pinned Loading
-
xss-exploit-chain
xss-exploit-chain PublicSecurity assessment showcasing how simple input validation failures in a corporate social network lead to full administrative compromise and unauthorized treasury access.
JavaScript 2
-
wp-pie-exploit
wp-pie-exploit PublicA full-chain security audit demonstrating how everyday vulnerabilities like forgotten WordPress plugin updates, hardcoded plaintext secrets, and password reuse can escalate into a complete root ser…
PHP 1
-
stealth-scanner
stealth-scanner PublicA high-performance, containerized TCP SYN Port Scanner built with Python and Scapy for stealth network reconnaissance.
Python 1
-
nextcloud-rpi
nextcloud-rpi PublicSelf-hosted private cloud infrastructure on Raspberry Pi 5 using Docker Compose, MariaDB & Tailscale implementation for CGNAT bypass.
If the problem persists, check the GitHub status page or contact support.