Name: Fr4nzisko
Type: User
Bio: Senior Cybersecurity Engineer CBBH | eWPTXv2 | CRTP | CMPen | DANTE | eCPPT | eWPT | ISO 27001:2022 Lead Auditor | CEH Practical | eJPT | CAP | CCSP-AWS | CASA
Twitter: Fr4nzisko1
Location: Montreal, Canada
Blog: https://www.linkedin.com/in/jose-francisco-flores-/
Fr4nzisko's Projects
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses
winPEAS, but for Active Directory
A cheat sheet that contains advanced queries for SQL Injection of all types.
Setting up an android environment for dynamic analysis
A tool for reverse engineering Android apk files
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
A curated list of various bug bounty tools
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.
Poor (rich?) man's bug bounty pipeline https://dubell.io
Bug Bounty Web and API Payloads
Ultimate Burp Suite Exam and PortSwigger Labs Guide.
A simple script just made for self use for bypassing 403
Random scripts that I used in the CARTP course lab & final exam.
Dump cookies directly from Chrome process memory
Prototype Pollution and useful Script Gadgets
Lista de comandos básicos do terminal do Linux.
🎯 Command Injection Payload List
Copy as FFUF Command for Burp Suite
Script en powershell para automatizar un poco del evento.
🎯 CSV Injection Payloads
Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)
¡Escaner escrito en python!
Extended Static Analysis Tool for Analyzing Android APK Files.
Script que te ayudará a crear tu propio laboratorio de escalada de privilegios local en Windows 10 Pro x64 y Windows 11 Pro.
Mi perfil profesional de Github
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. Feel free to modiy and DM if you find some bugs :)