The Ultimate Information Gathering Toolkit
☆3,487Dec 10, 2025Updated 4 months ago
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All-in-One Toolkit for BruteForce Attacks☆1,122Sep 28, 2024Updated last year
- Information Gatherer & Webapps Exploiter☆216Sep 3, 2024Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago
- 🔍 Search anyone's digital footprint across 300+ websites☆3,337Apr 3, 2026Updated 3 weeks ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,470Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,280Jul 18, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,135Jan 6, 2026Updated 3 months ago
- secator - the pentester's swiss knife☆1,279Updated this week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,560Dec 7, 2025Updated 4 months ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆671May 10, 2025Updated 11 months ago
- A Onion websites searcher☆659Feb 21, 2026Updated 2 months ago
- The recursive internet scanner for hackers. 🧡☆9,633Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆637Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆517Aug 14, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆753Jan 25, 2026Updated 3 months ago
- WiFi Penetration Testing & Auditing Tool☆776Apr 28, 2025Updated last year
- TerminatorZ is a highly sophisticated and efficient Offensive CVE Exploitation Framework that scans for top potential vulnerabilities wit…☆317Apr 21, 2026Updated last week
- The Network Execution Tool☆5,487Updated this week
- Open Cyber Threat Intelligence Platform☆9,207Updated this week
- Fully featured and community-driven hacking environment☆2,982Apr 9, 2026Updated 3 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,344Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,837Apr 17, 2026Updated 2 weeks ago
- Header Exploitation HTTP☆733Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆401Jul 23, 2025Updated 9 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆248Oct 11, 2025Updated 6 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆732Apr 2, 2026Updated last month
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,793Jun 15, 2025Updated 10 months ago
- Open Adversarial Exposure Validation Platform☆1,670Apr 25, 2026Updated last week
- Automation tool to testing and confirm the xss vulnerability.☆307Jul 18, 2025Updated 9 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆483Feb 14, 2026Updated 2 months ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,838Updated this week
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,454Nov 19, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,367Nov 12, 2025Updated 5 months ago
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆562Jan 18, 2026Updated 3 months ago
- OSINT tool to crawl a site and extract useful recon info.☆462Aug 13, 2025Updated 8 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆276Dec 23, 2024Updated last year
- Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.☆2,158Apr 24, 2026Updated last week