☆52Jul 11, 2024Updated last year
Alternatives and similar repositories for Argus
Users that are interested in Argus are comparing it to the libraries listed below
Sorting:
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆26Feb 13, 2024Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 9 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- GitHub Actions Security Tester☆12Feb 1, 2023Updated 3 years ago
- ☆11Dec 26, 2023Updated 2 years ago
- ☆18Dec 1, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆120Feb 7, 2024Updated 2 years ago
- ☆56Jan 22, 2025Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- TaintFlow, a framework for JavaScript dynamic information flow analysis.☆18Jan 18, 2023Updated 3 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 4 years ago
- Discovered Data and Source Code☆10May 5, 2025Updated 10 months ago
- ☆36Apr 29, 2025Updated 10 months ago
- Builds scripts for openSSL 1.0.2h on Android☆17Feb 14, 2017Updated 9 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- ☆13Dec 15, 2024Updated last year
- Software Supply Chain Attribute Integrity (SCAI) Demos and CLI tools☆19Mar 5, 2026Updated 2 weeks ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Sep 11, 2025Updated 6 months ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- ☆36Apr 24, 2024Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 6 years ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Jan 20, 2024Updated 2 years ago
- A fast subdomain takeover tool☆86Nov 10, 2023Updated 2 years ago