Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ClickFix Attack Targets macOS with Fake Disk Cleanup Lures
May 7, 2026
Massive 2.45B-Request DDoS Attack Used 1.2 Million IPs to Evade
May 7, 2026
Google Chrome 148 Released with Fix for 127 Security
May 7, 2026
Home/CyberSecurity News/Argus: Python Toolkit for Info Gathering & Reconnaissance
CyberSecurity News

Argus: Python Toolkit for Info Gathering & Reconnaissance

Argus, a Python-based toolkit, provides comprehensive capabilities for cybersecurity reconnaissance. Its developers recently unveiled version 2.0, significantly expanding the platform to include 135...

Marcus Rodriguez
Marcus Rodriguez
January 17, 2026 2 Min Read
1 0

Argus, a Python-based toolkit, provides comprehensive capabilities for cybersecurity reconnaissance. Its developers recently unveiled version 2.0, significantly expanding the platform to include 135 distinct modules.

This tool consolidates network analysis, web app scanning, and threat intelligence into one interface. Users access modules through an interactive CLI that supports searching, favorites, and batch runs. Network and infrastructure modules cover DNS records, open ports, SSL chain analysis, and traceroute from 1 to 52.

Web application analysis spans 53 to 102, including CMS detection, content discovery, JavaScript analyzers, and CORS scanners. Security and threat intelligence modules, numbered 103 to 135, handle Shodan queries, VirusTotal scans, subdomain takeovers, and cloud exposure checks.

Category Module Count Key Examples
Network & Infrastructure 52 DNS Records, Open Ports Scan, WHOIS Lookup
Web Application Analysis 50 Directory Finder, Technology Stack Detection, GraphQL Probe
Security & Threat Intelligence 33 Censys Recon, Subdomain Enumeration, JS Malware Scanner

Profiles like “speed” or “deep” adjust thread counts and timeouts for different scan intensities.

Installation Methods

Installation options suit various environments. Direct run requires git clone, pip install requirements, and python -m argus. Pip users type pip install argus-recon, then argus.

Full setup uses an install.sh script after cloning. Docker builds an image with volume mounts for results. All methods support Linux, macOS, and Windows via Python 3.10+.

Option Commands Best For
No Install git clone https://github.com/jasonxtn/argus.git; cd argus; pip install -r requirements.txt; python -m argus Quick tests
Pip pip install argus-recon; argus Minimal setup
Full git clone …; chmod +x install.sh; ./install.sh; python -m argus Development
Docker git clone …; docker build -t argus-recon:latest .; docker run … Containers

The CLI screenshot shows the module menu clearly.

Launch with argus, list modules with “modules”, select via “use 1”, set target like “set target example.com”, then “run”. Commands include “runall infra” for categories and “show api_status” for integrations.

Configure API keys for Shodan, VirusTotal, and Censys in settings.py or env vars. Export outputs as TXT, CSV, or JSON. Version 2.0 breaks from legacy 1.x by adding 25+ commands, multi-threading, and UI improvements.

Security experts praise its breadth for red teaming and OSINT, reducing tool sprawl. Always obtain permission; the tool includes a legal disclaimer against misuse. Argus simplifies recon workflows for pentesters and analysts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CybersecurityMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Researchers Access StealC Malware Command-and-Control Systems

Next Post

Vertex AI Flaw: Low-Privileged Users Gain Google’s Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FEMITBOT Network Pushes Crypto Fraud via Telegram Uses Mini
May 7, 2026
Darkhub Hacking-for-Hire Portal: Crypto Advertises Fraud
May 7, 2026
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us