Argus: The Ultimate Information Gathering Toolkit

Argus

Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance. With a user-friendly interface and a suite of powerful modules, Argus empowers you to explore networks, web applications, and security configurations efficiently and effectively.

Whether you’re conducting research, performing security assessments with proper authorization, or just curious about network infrastructures, Argus brings a wealth of information to your fingertips—all in one place.

Information Gathering

Argus offers a rich collection of tools categorized into three main areas:

Network & Infrastructure Tools

These tools help you gather data about a network, uncovering vital details about servers, IP addresses, DNS records, and more:

  1. Associated Hosts: Discover domains associated with the target.
  2. DNS Over HTTPS: Resolve DNS securely via encrypted channels.
  3. DNS Records: Collect DNS records, including A, AAAA, MX, etc.
  4. DNSSEC Check: Verify if DNSSEC is properly configured.
  5. Domain Info: Gather information such as registrar details and expiry dates.
  6. Domain Reputation Check: Check domain trustworthiness using various reputation sources.
  7. IP Info: Retrieve geographic and ownership details of an IP address.
  8. Open Ports Scan: Scan the target for open ports and services.
  9. Server Info: Extract key server details using various techniques.
  10. Server Location: Identify the physical location of the server.
  11. SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
  12. SSL Expiry Alert: Check SSL certificates for upcoming expiry.
  13. TLS Cipher Suites: List the supported TLS ciphers on the server.
  14. TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
  15. Traceroute: Trace the path packets take to reach the target.
  16. TXT Records: Fetch TXT records, often used for verification purposes.
  17. WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
  18. Zone Transfer: Attempt to perform DNS zone transfers.

Web Application Analysis Tools

These modules focus on understanding the structure and security of web applications:

  1. Archive History: View the target’s history using internet archives.
  2. Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
  3. Carbon Footprint: Evaluate the environmental impact of a website.
  4. CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
  5. Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
  6. Content Discovery: Discover hidden directories, files, and endpoints.
  7. Crawler: Crawl the site to uncover data and map out its structure.
  8. Robots.txt Analyzer: Analyze the robots.txt file for hidden resources.
  9. Directory Finder: Look for directories that may not be indexed publicly.
  10. Performance Monitoring: Monitor the website’s response time and load performance.
  11. Quality Metrics: Assess the quality of the site’s content and user experience.
  12. Redirect Chain: Follow redirects to analyze if they’re safe or malicious.
  13. Sitemap Parsing: Extract URLs from the site’s sitemap.
  14. Social Media Presence Scan: Analyze the social media profiles linked to the target.
  15. Technology Stack Detection: Identify the technologies and frameworks the site uses.
  16. Third-Party Integrations: Discover any third-party services integrated into the site.

Security & Threat Intelligence Tools

The security modules in Argus are designed to assess the target’s defenses and gather threat intelligence:

  1. Censys Reconnaissance: Use Censys for in-depth details about the target’s assets.
  2. Certificate Authority Recon: Examine the certificate authority details.
  3. Data Leak Detection: Check for potential data leaks and sensitive data exposure.
  4. Firewall Detection: Identify whether a firewall or WAF is protecting the target.
  5. Global Ranking: Look up the site’s global ranking to gauge its popularity.
  6. HTTP Headers: Extract and evaluate HTTP response headers.
  7. HTTP Security Features: Check for secure HTTP headers such as HSTS, CSP, etc.
  8. Malware & Phishing Check: Scan the site for signs of malware and phishing risks.
  9. Pastebin Monitoring: Search paste sites for leaks associated with the target.
  10. Privacy & GDPR Compliance: Verify compliance with GDPR and other privacy regulations.
  11. Security.txt Check: Locate and analyze the security.txt file for vulnerability disclosure policies.
  12. Shodan Reconnaissance: Use Shodan to discover open ports, services, and vulnerabilities.
  13. SSL Labs Report: Get a detailed SSL/TLS assessment via SSL Labs.
  14. SSL Pinning Check: Check if SSL pinning is implemented on the site.
  15. Subdomain Enumeration: Discover subdomains of the target domain.
  16. Subdomain Takeover: Test whether subdomains are vulnerable to takeover.
  17. VirusTotal Scan: Check the target’s reputation using VirusTotal.

Install & Use