The Ultimate Information Gathering Toolkit
☆3,330Dec 10, 2025Updated 3 months ago
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below
Sorting:
- All-in-One Toolkit for BruteForce Attacks☆1,086Sep 28, 2024Updated last year
- Information Gatherer & Webapps Exploiter☆212Sep 3, 2024Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 2 months ago
- 🔍 Search anyone's digital footprint across 300+ websites☆3,265Dec 1, 2025Updated 3 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,393Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,266Jul 18, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,113Jan 6, 2026Updated 2 months ago
- secator - the pentester's swiss knife☆1,249Updated this week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,535Dec 7, 2025Updated 3 months ago
- The recursive internet scanner for hackers. 🧡☆9,513Updated this week
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆664May 10, 2025Updated 10 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 7 months ago
- A Onion websites searcher☆652Feb 21, 2026Updated last month
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆612Mar 5, 2026Updated 2 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆740Jan 25, 2026Updated last month
- WiFi Penetration Testing & Auditing Tool☆755Apr 28, 2025Updated 10 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆299Mar 9, 2026Updated last week
- The Network Execution Tool☆5,339Mar 14, 2026Updated last week
- Open Cyber Threat Intelligence Platform☆9,023Updated this week
- Fully featured and community-driven hacking environment☆2,951Mar 8, 2026Updated 2 weeks ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,315Updated this week
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,826Aug 20, 2025Updated 7 months ago
- Header Exploitation HTTP☆723Updated this week
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 7 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆730Feb 14, 2026Updated last month
- Discover and monitor internet assets using favicon hashes across search engines.☆247Oct 11, 2025Updated 5 months ago
- Open Adversarial Exposure Validation Platform☆1,645Updated this week
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,785Jun 15, 2025Updated 9 months ago
- Automation tool to testing and confirm the xss vulnerability.☆306Jul 18, 2025Updated 8 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆472Feb 14, 2026Updated last month
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,771Mar 14, 2026Updated last week
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,411Nov 19, 2025Updated 4 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆546Jan 18, 2026Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆271Dec 23, 2024Updated last year
- Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.☆1,896Mar 1, 2026Updated 3 weeks ago
- OSINT tool to crawl a site and extract useful recon info.☆459Aug 13, 2025Updated 7 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,587Mar 18, 2025Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,330Nov 12, 2025Updated 4 months ago