Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection
☆13Nov 1, 2024Updated last year
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below
Sorting:
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆19Nov 21, 2025Updated 3 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- ☆14Nov 8, 2024Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 3 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆54Feb 12, 2025Updated last year
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Recon (Whois)☆15May 25, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- NetScan CLI is a command-line tool for retrieving and analyzing IP address information. It provides detailed subnet and organization data…☆62Sep 4, 2024Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 7 months ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last week
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- TCP over DNS tunnel b[l]ind written in go.☆16Dec 22, 2024Updated last year
- The Primate Pack is a suite of extensions for Caido.☆13Sep 29, 2024Updated last year
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 8 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆60Jul 7, 2024Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- ☆42Dec 24, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆19Dec 20, 2023Updated 2 years ago
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆49Oct 2, 2024Updated last year
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ☆51Jun 4, 2022Updated 3 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆26Jun 5, 2024Updated last year
- Basic script to generate reverse shell payloads, generally most used in ctf.☆27Mar 20, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Updated this week
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year
- ☆32Apr 16, 2025Updated 10 months ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago