The Ultimate Information Gathering Toolkit
☆3,428Dec 10, 2025Updated 4 months ago
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All-in-One Toolkit for BruteForce Attacks☆1,114Sep 28, 2024Updated last year
- Information Gatherer & Webapps Exploiter☆216Sep 3, 2024Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago
- 🔍 Search anyone's digital footprint across 300+ websites☆3,313Apr 3, 2026Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,412Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,280Jul 18, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,126Jan 6, 2026Updated 3 months ago
- secator - the pentester's swiss knife☆1,263Updated this week
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,550Dec 7, 2025Updated 4 months ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆668May 10, 2025Updated 11 months ago
- The recursive internet scanner for hackers. 🧡☆9,583Updated this week
- A Onion websites searcher☆655Feb 21, 2026Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆621Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆746Jan 25, 2026Updated 2 months ago
- WiFi Penetration Testing & Auditing Tool☆767Apr 28, 2025Updated 11 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆301Mar 9, 2026Updated last month
- The Network Execution Tool☆5,393Apr 3, 2026Updated last week
- Open Cyber Threat Intelligence Platform☆9,128Updated this week
- Fully featured and community-driven hacking environment☆2,967Mar 25, 2026Updated 2 weeks ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,830Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,326Updated this week
- Header Exploitation HTTP☆730Apr 3, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 8 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- Discover and monitor internet assets using favicon hashes across search engines.☆248Oct 11, 2025Updated 6 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,788Jun 15, 2025Updated 9 months ago
- Open Adversarial Exposure Validation Platform☆1,655Apr 5, 2026Updated last week
- Automation tool to testing and confirm the xss vulnerability.☆307Jul 18, 2025Updated 8 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆480Feb 14, 2026Updated last month
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,818Mar 25, 2026Updated 2 weeks ago
- ClatScope Info Tool – The best and most versatile OSINT utility for retrieving geolocation, DNS, WHOIS, phone, email, data breach informa…☆1,435Nov 19, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆556Jan 18, 2026Updated 2 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆272Dec 23, 2024Updated last year
- Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.☆2,069Apr 5, 2026Updated last week
- OSINT tool to crawl a site and extract useful recon info.☆460Aug 13, 2025Updated 7 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,416Mar 25, 2026Updated 2 weeks ago
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year