Pinned Repositories
3klCon
Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files.
3klector
3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company
ARP-Spoofer
This tool used to be MITM Attack. To be in the middle between 2 machines like victim machine and the router.
crtfinder
Fast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
Explorer
Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of things individually or all together.
GG-Dorking
GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.
My_CVEs
This repository contain all my assigned CVEs. Some of them are public and the other will be published soon.
PackSniff
PackSniff tool is used to sniff the packet which come to your machine after performing ARP Spoofing as a part of the Man-In-The-Middle attacks.
ShoLister
ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be used from Penetration Tester and Bug Bounty Hunters.
SQLiDetector
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
eslam3kl's Repositories
eslam3kl/3klCon
Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files.
eslam3kl/SQLiDetector
Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests with 14 payloads and checking for 152 regex patterns for different databases.
eslam3kl/crtfinder
Fast tool to extract all subdomains from crt.sh website. Output will be up to sub.sub.sub.subdomain.com with standard and advanced search techniques
eslam3kl/GG-Dorking
GG Dorking is a tool to generate GitHub and Google dorking for pentesters and bug bounty hunters.
eslam3kl/ShoLister
ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be used from Penetration Tester and Bug Bounty Hunters.
eslam3kl/3klector
3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company
eslam3kl/Explorer
Explorer is a very useful tool which will help you in the Recon phase in Bug Bounty hunting or Web Pentesting. It can perform a lot of things individually or all together.
eslam3kl/PackSniff
PackSniff tool is used to sniff the packet which come to your machine after performing ARP Spoofing as a part of the Man-In-The-Middle attacks.
eslam3kl/ARP-Spoofer
This tool used to be MITM Attack. To be in the middle between 2 machines like victim machine and the router.
eslam3kl/MAC_Changer
This is simple tool to change your MAC address in specific Interface. This tool written in python.
eslam3kl/NetScanner
This simple tool is used ot get the IPs and MAC addresses of the devices which connect to your network.
eslam3kl/quick-pentest-scripts
small straightforward quick scripts
eslam3kl/Shodomain
Shodan subdomain finder
eslam3kl/awesome-cve-poc
✍️ A curated list of CVE PoCs.
eslam3kl/My_CVEs
This repository contain all my assigned CVEs. Some of them are public and the other will be published soon.
eslam3kl/reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
eslam3kl/exphub
Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
eslam3kl/Gf-Patterns
GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep
eslam3kl/SecurityTesting
eslam3kl/Domain-to-IP-Converter
Domain2IP Converter
eslam3kl/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.