Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance.
With a user-friendly interface and a suite of powerful modules, Argus empowers you to explore networks, web applications, and security configurations efficiently and effectively.
Whether you’re conducting research, performing security assessments with proper authorization, or just curious about network infrastructures, Argus brings a wealth of information to your fingertips—all in one place.
WARNING: LEGAL DISCLAIMER
This tool is intended for educational and ethical use only. The author is not liable for any illegal use or misuse of this tool. Users are solely responsible for their actions and must ensure they have explicit permission to scan the target systems.
Installation
To get started with Argus, follow these simple steps:
git clone https://github.com/jasonxtn/argus.git
cd argus
pip install -r requirements.txt
Once installed, you can launch Argus with:
python argus.py
Usage
Argus offers a rich collection of tools categorized into three main areas:
Network And Infrastructure Tools
These tools help you gather data about a network, uncovering vital details about servers, IP addresses, DNS records, and more:
- Associated Hosts: Discover domains associated with the target.
- DNS Over HTTPS: Resolve DNS securely via encrypted channels.
- DNS Records: Collect DNS records, including A, AAAA, MX, etc.
- DNSSEC Check: Verify if DNSSEC is properly configured.
- Domain Info: Gather information such as registrar details and expiry dates.
- Domain Reputation Check: Check domain trustworthiness using various reputation sources.
- IP Info: Retrieve geographic and ownership details of an IP address.
- Open Ports Scan: Scan the target for open ports and services.
- Server Info: Extract key server details using various techniques.
- Server Location: Identify the physical location of the server.
- SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
- SSL Expiry Alert: Check SSL certificates for upcoming expiry.
- TLS Cipher Suites: List the supported TLS ciphers on the server.
- TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
- Traceroute: Trace the path packets take to reach the target.
- TXT Records: Fetch TXT records, often used for verification purposes.
- WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
- Zone Transfer: Attempt to perform DNS zone transfers.
Web Application Analysis Tools
These modules focus on understanding the structure and security of web applications:
- Archive History: View the target’s history using internet archives.
- Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
- Carbon Footprint: Evaluate the environmental impact of a website.
- CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
- Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
- Content Discovery: Discover hidden directories, files, and endpoints.
- Crawler: Crawl the site to uncover data and map out its structure.
- Robots.txt Analyzer: Analyze the
robots.txt
file for hidden resources. - Directory Finder: Look for directories that may not be indexed publicly.
- Performance Monitoring: Monitor the website’s response time and load performance.
- Quality Metrics: Assess the quality of the site’s content and user experience.
- Redirect Chain: Follow redirects to analyze if they’re safe or malicious.
- Sitemap Parsing: Extract URLs from the site’s sitemap.
- Social Media Presence Scan: Analyze the social media profiles linked to the target.
- Technology Stack Detection: Identify the technologies and frameworks the site uses.
- Third-Party Integrations: Discover any third-party services integrated into the site.
For more information click here.