/Argus

The Ultimate Information Gathering Toolkit

Primary LanguagePython

A Python-based toolkit for Information Gathering and
Reconnaissance

screenshot


About The Project

Argus is an all-in-one, Python-powered toolkit designed to streamline the process of information gathering and reconnaissance. With a user-friendly interface and a suite of powerful modules, Argus empowers you to explore networks, web applications, and security configurations efficiently and effectively.

Whether you're conducting research, performing security assessments with proper authorization, or just curious about network infrastructures, Argus brings a wealth of information to your fingertips—all in one place.

⚠️ WARNING: LEGAL DISCLAIMER

This tool is intended for educational and ethical use only. The author is not liable for any illegal use or misuse of this tool. Users are solely responsible for their actions and must ensure they have explicit permission to scan the target systems.


👀 Screenshots

Take a look at Argus in action:


⚙️ Installation

To get started with Argus, follow these simple steps:

git clone https://github.com/jasonxtn/argus.git
cd argus
pip install -r requirements.txt

Once installed, you can launch Argus with:

python argus.py

📖 Usage

Argus offers a rich collection of tools categorized into three main areas:

Network & Infrastructure Tools

These tools help you gather data about a network, uncovering vital details about servers, IP addresses, DNS records, and more:

  1. Associated Hosts: Discover domains associated with the target.
  2. DNS Over HTTPS: Resolve DNS securely via encrypted channels.
  3. DNS Records: Collect DNS records, including A, AAAA, MX, etc.
  4. DNSSEC Check: Verify if DNSSEC is properly configured.
  5. Domain Info: Gather information such as registrar details and expiry dates.
  6. Domain Reputation Check: Check domain trustworthiness using various reputation sources.
  7. IP Info: Retrieve geographic and ownership details of an IP address.
  8. Open Ports Scan: Scan the target for open ports and services.
  9. Server Info: Extract key server details using various techniques.
  10. Server Location: Identify the physical location of the server.
  11. SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
  12. SSL Expiry Alert: Check SSL certificates for upcoming expiry.
  13. TLS Cipher Suites: List the supported TLS ciphers on the server.
  14. TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
  15. Traceroute: Trace the path packets take to reach the target.
  16. TXT Records: Fetch TXT records, often used for verification purposes.
  17. WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
  18. Zone Transfer: Attempt to perform DNS zone transfers.
  19. HTTP/2 and HTTP/3 Support Checker: Check if the server supports HTTP/2 and HTTP/3.

Web Application Analysis Tools

These modules focus on understanding the structure and security of web applications:

  1. Archive History: View the target's history using internet archives.
  2. Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
  3. Carbon Footprint: Evaluate the environmental impact of a website.
  4. CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
  5. Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
  6. Content Discovery: Discover hidden directories, files, and endpoints.
  7. Crawler: Crawl the site to uncover data and map out its structure.
  8. Robots.txt Analyzer: Analyze the robots.txt file for hidden resources.
  9. Directory Finder: Look for directories that may not be indexed publicly.
  10. Email Harvesting: Extract email addresses from the target domain.
  11. Performance Monitoring: Monitor the website's response time and load performance.
  12. Quality Metrics: Assess the quality of the site's content and user experience.
  13. Redirect Chain: Follow redirects to analyze if they're safe or malicious.
  14. Sitemap Parsing: Extract URLs from the site's sitemap.
  15. Social Media Presence Scan: Analyze the social media profiles linked to the target.
  16. Technology Stack Detection: Identify the technologies and frameworks the site uses.
  17. Third-Party Integrations: Discover any third-party services integrated into the site.

Security & Threat Intelligence Tools

The security modules in Argus are designed to assess the target's defenses and gather threat intelligence:

  1. Censys Reconnaissance: Use Censys for in-depth details about the target's assets.
  2. Certificate Authority Recon: Examine the certificate authority details.
  3. Data Leak Detection: Check for potential data leaks and sensitive data exposure.
  4. Exposed Environment Files Checker: Identify publicly exposed .env files.
  5. Firewall Detection: Identify whether a firewall or WAF is protecting the target.
  6. Global Ranking: Look up the site's global ranking to gauge its popularity.
  7. HTTP Headers: Extract and evaluate HTTP response headers.
  8. HTTP Security Features: Check for secure HTTP headers such as HSTS, CSP, etc.
  9. Malware & Phishing Check: Scan the site for signs of malware and phishing risks.
  10. Pastebin Monitoring: Search paste sites for leaks associated with the target.
  11. Privacy & GDPR Compliance: Verify compliance with GDPR and other privacy regulations.
  12. Security.txt Check: Locate and analyze the security.txt file for vulnerability disclosure policies.
  13. Shodan Reconnaissance: Use Shodan to discover open ports, services, and vulnerabilities.
  14. SSL Labs Report: Get a detailed SSL/TLS assessment via SSL Labs.
  15. SSL Pinning Check: Check if SSL pinning is implemented on the site.
  16. Subdomain Enumeration: Discover subdomains of the target domain.
  17. Subdomain Takeover: Test whether subdomains are vulnerable to takeover.
  18. VirusTotal Scan: Check the target's reputation using VirusTotal.

How to Use Argus

  1. Launch Argus from the command line.
  2. Enter the tool number you want to use from the main menu.
  3. Follow the prompts to enter relevant information.
  4. Review the results and adjust your strategy accordingly.

Example Command:

root@argus:~# 1

This command initiates the Associated Hosts tool.


🛠 Configuration

Certain modules require API keys to work. Make sure to add any necessary API keys in the config/settings.py file before running Argus to unlock full functionality.


🔄 Changelog

1.1 Release Notes :

  • Added Emails Harvesting module
  • Added HTTP/2 and HTTP/3 Support Checker module
  • Added Check for Publicly Exposed Environment Files module
  • Fixed Txt Files Export
  • Updated Traceroute module
  • Updated Report Generation module
  • Added .gitignore file

⭐️ Show Your Support

If this tool has been helpful to you, please consider giving us a star on GitHub! Your support means a lot to us and helps others discover the project.