Need help with Garud?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

157 Stars 41 Forks MIT License 95 Commits 0 Opened issues


An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically.

Services available


Need anything else?

Contributors list



An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.


  • Requirements: Go Language, Python 2.7 or Python 3.
  • System requirements: Recommended to run on vps with 1VCPU and 2GB ram.
  • Tools used - You must need to install these tools to use this script

  • Installation - Make sure you're root before installing the tool

    git clone && cd Garud/ && chmod +x garud && mv garud /usr/bin/ && ./
  • Usage

     █▀▀ ▄▀█ █▀█ █░█ █▀▄
     █▄█ █▀█ █▀▄ █▄█ █▄▀
     coded by R0X4R with <3

    Usage: -d target you want to scan ( Usage: -f output directory where you want to save file (~/target-output/) garud -d -f target-output

  • Slack Bot

   wget ~/
   pip3 install slackclient slacker

Add your slack token in file.

Slack Webhook for notify: Slack Blog

Configure Notify:

token-test - Slack bot tutorial:

About Garud

I made this tool to automate my recon and save my time. It really give me headache always type such command and then wait to complete one command and I type other command. So I collected some of the tools which is widely used in the bugbounty field. In this script I used Assetfinder, get-titles, httprobe, subjack, subzy, sublister, gau and gf patterns and then it uses ffuf, dalfox, nuclei and kxss to find some low hanging fruits.

The script first enumerates all the subdomains of the give target domain using assetfinder and sublister then filters all live domains from the whole subdomain list then it extarct titles of the subdomains using get-title then it scans for subdomain takeover using subjack and subzy. Then it uses gau to extract paramters of the given subdomains then it use gf patterns to filters xss, ssti, ssrf, sqli params from that given subdomains and then it scans for low hanging fruits as well. Then it'll save all the output in a text file like target-xss.txt.

forthebadge forthebadge

Thanks to the authors of the tools used in this script.

@aboul3la @tomnomnom @lc @LukaSikic @haccer @hahwul @projectdiscovery @maurosoria @shelld3v @devanshbatham

Warning: This code was originally created for personal use, it generates a substantial amount of traffic, please use with caution.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.