October 5

Argus

Argus - это универсальный инструментарий на базе Python, предназначенный для оптимизации процесса сбора и разведки информации. Благодаря удобному интерфейсу и набору мощных модулей Argus позволяет вам эффективно исследовать сети, веб-приложения и конфигурации безопасности.

Особенности:

Network & Infrastructure Tools

  • Associated Hosts: Discover domains associated with the target.
  • DNS Over HTTPS: Resolve DNS securely via encrypted channels.
  • DNS Records: Collect DNS records, including A, AAAA, MX, etc.
  • DNSSEC Check: Verify if DNSSEC is properly configured.
  • Domain Info: Gather information such as registrar details and expiry dates.
  • Domain Reputation Check: Check domain trustworthiness using various reputation sources.
  • IP Info: Retrieve geographic and ownership details of an IP address.
  • Open Ports Scan: Scan the target for open ports and services.
  • Server Info: Extract key server details using various techniques.
  • Server Location: Identify the physical location of the server.
  • SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
  • SSL Expiry Alert: Check SSL certificates for upcoming expiry.
  • TLS Cipher Suites: List the supported TLS ciphers on the server.
  • TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
  • Traceroute: Trace the path packets take to reach the target.
  • TXT Records: Fetch TXT records, often used for verification purposes.
  • WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
  • Zone Transfer: Attempt to perform DNS zone transfers.

Web Application Analysis Tools

  • Archive History: View the target's history using internet archives.
  • Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
  • Carbon Footprint: Evaluate the environmental impact of a website.
  • CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
  • Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
  • Content Discovery: Discover hidden directories, files, and endpoints.
  • Crawler: Crawl the site to uncover data and map out its structure.
  • Robots.txt Analyzer: Analyze the robots.txt file for hidden resources.
  • Directory Finder: Look for directories that may not be indexed publicly.
  • Performance Monitoring: Monitor the website's response time and load performance.
  • Quality Metrics: Assess the quality of the site's content and user experience.
  • Redirect Chain: Follow redirects to analyze if they're safe or malicious.
  • Sitemap Parsing: Extract URLs from the site's sitemap.
  • Social Media Presence Scan: Analyze the social media profiles linked to the target.
  • Technology Stack Detection: Identify the technologies and frameworks the site uses.
  • Third-Party Integrations: Discover any third-party services integrated into the site.

Security & Threat Intelligence Tools

  • Censys Reconnaissance: Use Censys for in-depth details about the target's assets.
  • Certificate Authority Recon: Examine the certificate authority details.
  • Data Leak Detection: Check for potential data leaks and sensitive data exposure.
  • Firewall Detection: Identify whether a firewall or WAF is protecting the target.
  • Global Ranking: Look up the site's global ranking to gauge its popularity.
  • HTTP Headers: Extract and evaluate HTTP response headers.
  • HTTP Security Features: Check for secure HTTP headers such as HSTS, CSP, etc.
  • Malware & Phishing Check: Scan the site for signs of malware and phishing risks.
  • Pastebin Monitoring: Search paste sites for leaks associated with the target.
  • Privacy & GDPR Compliance: Verify compliance with GDPR and other privacy regulations.
  • Security.txt Check: Locate and analyze the security.txt file for vulnerability disclosure policies.
  • Shodan Reconnaissance: Use Shodan to discover open ports, services, and vulnerabilities.
  • SSL Labs Report: Get a detailed SSL/TLS assessment via SSL Labs.
  • SSL Pinning Check: Check if SSL pinning is implemented on the site.
  • Subdomain Enumeration: Discover subdomains of the target domain.
  • Subdomain Takeover: Test whether subdomains are vulnerable to takeover.
  • VirusTotal Scan: Check the target's reputation using VirusTotal.

Download / Github