October 5
Argus
Argus - это универсальный инструментарий на базе Python, предназначенный для оптимизации процесса сбора и разведки информации. Благодаря удобному интерфейсу и набору мощных модулей Argus позволяет вам эффективно исследовать сети, веб-приложения и конфигурации безопасности.
Network & Infrastructure Tools
- Associated Hosts: Discover domains associated with the target.
- DNS Over HTTPS: Resolve DNS securely via encrypted channels.
- DNS Records: Collect DNS records, including A, AAAA, MX, etc.
- DNSSEC Check: Verify if DNSSEC is properly configured.
- Domain Info: Gather information such as registrar details and expiry dates.
- Domain Reputation Check: Check domain trustworthiness using various reputation sources.
- IP Info: Retrieve geographic and ownership details of an IP address.
- Open Ports Scan: Scan the target for open ports and services.
- Server Info: Extract key server details using various techniques.
- Server Location: Identify the physical location of the server.
- SSL Chain Analysis: Analyze the SSL certificate chain for trustworthiness.
- SSL Expiry Alert: Check SSL certificates for upcoming expiry.
- TLS Cipher Suites: List the supported TLS ciphers on the server.
- TLS Handshake Simulation: Simulate a TLS handshake to check for security issues.
- Traceroute: Trace the path packets take to reach the target.
- TXT Records: Fetch TXT records, often used for verification purposes.
- WHOIS Lookup: Perform WHOIS queries to gather domain ownership details.
- Zone Transfer: Attempt to perform DNS zone transfers.
Web Application Analysis Tools
- Archive History: View the target's history using internet archives.
- Broken Links Detection: Find broken links that may lead to user frustration or security gaps.
- Carbon Footprint: Evaluate the environmental impact of a website.
- CMS Detection: Detect the type of CMS used, like WordPress, Joomla, etc.
- Cookies Analyzer: Analyze cookies for secure attributes and potential privacy issues.
- Content Discovery: Discover hidden directories, files, and endpoints.
- Crawler: Crawl the site to uncover data and map out its structure.
- Robots.txt Analyzer: Analyze the
robots.txt
file for hidden resources. - Directory Finder: Look for directories that may not be indexed publicly.
- Performance Monitoring: Monitor the website's response time and load performance.
- Quality Metrics: Assess the quality of the site's content and user experience.
- Redirect Chain: Follow redirects to analyze if they're safe or malicious.
- Sitemap Parsing: Extract URLs from the site's sitemap.
- Social Media Presence Scan: Analyze the social media profiles linked to the target.
- Technology Stack Detection: Identify the technologies and frameworks the site uses.
- Third-Party Integrations: Discover any third-party services integrated into the site.
Security & Threat Intelligence Tools
- Censys Reconnaissance: Use Censys for in-depth details about the target's assets.
- Certificate Authority Recon: Examine the certificate authority details.
- Data Leak Detection: Check for potential data leaks and sensitive data exposure.
- Firewall Detection: Identify whether a firewall or WAF is protecting the target.
- Global Ranking: Look up the site's global ranking to gauge its popularity.
- HTTP Headers: Extract and evaluate HTTP response headers.
- HTTP Security Features: Check for secure HTTP headers such as HSTS, CSP, etc.
- Malware & Phishing Check: Scan the site for signs of malware and phishing risks.
- Pastebin Monitoring: Search paste sites for leaks associated with the target.
- Privacy & GDPR Compliance: Verify compliance with GDPR and other privacy regulations.
- Security.txt Check: Locate and analyze the
security.txt
file for vulnerability disclosure policies. - Shodan Reconnaissance: Use Shodan to discover open ports, services, and vulnerabilities.
- SSL Labs Report: Get a detailed SSL/TLS assessment via SSL Labs.
- SSL Pinning Check: Check if SSL pinning is implemented on the site.
- Subdomain Enumeration: Discover subdomains of the target domain.
- Subdomain Takeover: Test whether subdomains are vulnerable to takeover.
- VirusTotal Scan: Check the target's reputation using VirusTotal.