Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python-powered Toolkit for Information Gathering and reconnaissance

Python-powered Toolkit for Information Gathering and reconnaissance

Posted on January 17, 2026January 17, 2026 By CWS

Argus is a complete Python-based toolkit designed for reconnaissance duties in cybersecurity. The builders not too long ago launched model 2.0, increasing it to incorporate 135 modules.

This device consolidates community evaluation, net app scanning, and menace intelligence into one interface. Customers entry modules via an interactive CLI that helps looking out, favorites, and batch runs. Community and infrastructure modules cowl DNS information, open ports, SSL chain evaluation, and traceroute from 1 to 52.

Internet software evaluation spans 53 to 102, together with CMS detection, content material discovery, JavaScript analyzers, and CORS scanners. Safety and menace intelligence modules, numbered 103 to 135, deal with Shodan queries, VirusTotal scans, subdomain takeovers, and cloud publicity checks.

CategoryModule CountKey ExamplesNetwork & Infrastructure52DNS Information, Open Ports Scan, WHOIS LookupWeb Utility Analysis50Directory Finder, Know-how Stack Detection, GraphQL ProbeSecurity & Risk Intelligence33Censys Recon, Subdomain Enumeration, JS Malware Scanner

Profiles like “pace” or “deep” alter thread counts and timeouts for various scan intensities.

Set up Strategies

Set up choices go well with varied environments. Direct run requires git clone, pip set up necessities, and python -m argus. Pip customers kind pip set up argus-recon, then argus.

Full setup makes use of an set up.sh script after cloning. Docker builds a picture with quantity mounts for outcomes. All strategies help Linux, macOS, and Home windows by way of Python 3.10+.

OptionCommandsBest ForNo Installgit clone cd argus; pip set up -r necessities.txt; python -m argusQuick testsPippip set up argus-recon; argusMinimal setupFullgit clone …; chmod +x set up.sh; ./set up.sh; python -m argusDevelopmentDockergit clone …; docker construct -t argus-recon:newest .; docker run …Containers

The CLI screenshot reveals the module menu clearly.

Launch with argus, listing modules with “modules”, choose by way of “use 1”, set goal like “set goal instance.com”, then “run”. Instructions embody “runall infra” for classes and “present api_status” for integrations.

Configure API keys for Shodan, VirusTotal, and Censys in settings.py or env vars. Export outputs as TXT, CSV, or JSON. Model 2.0 breaks from legacy 1.x by including 25+ instructions, multi-threading, and UI enhancements.

Safety consultants reward its breadth for crimson teaming and OSINT, decreasing device sprawl. At all times receive permission; the device features a authorized disclaimer in opposition to misuse. Argus simplifies recon workflows for pentesters and analysts.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Gathering, Information, Pythonpowered, Reconnaissance, Toolkit

Post navigation

Previous Post: Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles
Next Post: Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available

Related Posts

Chinese Hackers Organization Influence U.S. Government Policy on International Issues Chinese Hackers Organization Influence U.S. Government Policy on International Issues Cyber Security News
Enhancing Security: The Role of Threat Intelligence Enhancing Security: The Role of Threat Intelligence Cyber Security News
AI Browsers Bypass Content PayWall Mimicking as a Human-User AI Browsers Bypass Content PayWall Mimicking as a Human-User Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Cyber Security News
New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence New ToneShell Backdoor With New Features Leverage Task Scheduler COM Service for Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News