Skip to content

Arjun

HTTP parameter discovery suite

PythonGitHub

Description

Arjun finds hidden GET and POST parameters in web applications. It uses a massive default wordlist and multiple heuristics to detect parameters, making it excellent for finding attack surface that other tools miss.

Installation

BASH
pip install arjun

Basic Usage

BASH
# GET parameters
arjun -u https://target.com/page

# POST parameters
arjun -u https://target.com/page -m POST

# JSON body
arjun -u https://target.com/api -m JSON

Advanced Usage

BASH
# From file
arjun -i urls.txt -oT params.txt

# Custom wordlist
arjun -u https://target.com -w params.txt

# With headers
arjun -u https://target.com --headers "Cookie: session=abc"

# Set threads
arjun -u https://target.com -t 10

# Include specific parameters
arjun -u https://target.com --include id,page,search

# Output formats
arjun -u https://target.com -oJ results.json

Common Workflows

BASH
# Find hidden parameters in alive hosts
cat alive.txt | while read url; do arjun -u "$url" -oT params-found.txt; done

# Discover params, then fuzz
arjun -u https://target.com/search -oT params.txt