The Ultimate Information Gathering Toolkit
☆3,258Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below
Sorting:
- All-in-One Toolkit for BruteForce Attacks☆1,074Sep 28, 2024Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- 🔍 Search anyone's digital footprint across 300+ websites☆3,234Dec 1, 2025Updated 3 months ago
- secator - the pentester's swiss knife☆1,243Updated this week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,372Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,267Jul 18, 2024Updated last year
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,104Jan 6, 2026Updated last month
- Information Gatherer & Webapps Exploiter☆211Sep 3, 2024Updated last year
- A Onion websites searcher☆643Feb 21, 2026Updated last week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆605Feb 7, 2026Updated 3 weeks ago
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,524Dec 7, 2025Updated 2 months ago
- The recursive internet scanner for hackers. 🧡☆9,450Updated this week
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆728Jan 25, 2026Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Aug 14, 2025Updated 6 months ago
- WiFi Penetration Testing & Auditing Tool☆719Apr 28, 2025Updated 10 months ago
- Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality …☆662May 10, 2025Updated 9 months ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆243Jul 31, 2024Updated last year
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆296Sep 6, 2024Updated last year
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- The Network Execution Tool☆5,279Feb 23, 2026Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,302Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆725Feb 14, 2026Updated 2 weeks ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,314Nov 12, 2025Updated 3 months ago
- CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applicat…☆1,779Jun 15, 2025Updated 8 months ago
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,823Aug 20, 2025Updated 6 months ago
- Header Exploitation HTTP☆711Updated this week
- Open Adversarial Exposure Validation Platform☆1,629Updated this week
- OSINT tool to crawl a site and extract useful recon info.☆459Aug 13, 2025Updated 6 months ago
- Fully featured and community-driven hacking environment☆2,931Jan 14, 2026Updated last month
- Automation tool to testing and confirm the xss vulnerability.☆306Jul 18, 2025Updated 7 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆471Feb 14, 2026Updated 2 weeks ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,664Jun 22, 2025Updated 8 months ago
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆543Jan 18, 2026Updated last month
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,047Feb 16, 2026Updated 2 weeks ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆267Dec 23, 2024Updated last year
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- Ashok is a OSINT Recon Tool , a.k.a Swiss Army knife .☆422Jan 25, 2022Updated 4 years ago
- OffSec OSINT Pentest/RedTeam Tools☆1,118Jun 4, 2025Updated 8 months ago