Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Python-powered Toolkit for Information Gathering and reconnaissance

Python-powered Toolkit for Information Gathering and reconnaissance

Posted on January 17, 2026January 17, 2026 By CWS

Argus is a complete Python-based toolkit designed for reconnaissance duties in cybersecurity. The builders not too long ago launched model 2.0, increasing it to incorporate 135 modules.

This device consolidates community evaluation, net app scanning, and menace intelligence into one interface. Customers entry modules via an interactive CLI that helps looking out, favorites, and batch runs. Community and infrastructure modules cowl DNS information, open ports, SSL chain evaluation, and traceroute from 1 to 52.

Internet software evaluation spans 53 to 102, together with CMS detection, content material discovery, JavaScript analyzers, and CORS scanners. Safety and menace intelligence modules, numbered 103 to 135, deal with Shodan queries, VirusTotal scans, subdomain takeovers, and cloud publicity checks.

CategoryModule CountKey ExamplesNetwork & Infrastructure52DNS Information, Open Ports Scan, WHOIS LookupWeb Utility Analysis50Directory Finder, Know-how Stack Detection, GraphQL ProbeSecurity & Risk Intelligence33Censys Recon, Subdomain Enumeration, JS Malware Scanner

Profiles like “pace” or “deep” alter thread counts and timeouts for various scan intensities.

Set up Strategies

Set up choices go well with varied environments. Direct run requires git clone, pip set up necessities, and python -m argus. Pip customers kind pip set up argus-recon, then argus.

Full setup makes use of an set up.sh script after cloning. Docker builds a picture with quantity mounts for outcomes. All strategies help Linux, macOS, and Home windows by way of Python 3.10+.

OptionCommandsBest ForNo Installgit clone cd argus; pip set up -r necessities.txt; python -m argusQuick testsPippip set up argus-recon; argusMinimal setupFullgit clone …; chmod +x set up.sh; ./set up.sh; python -m argusDevelopmentDockergit clone …; docker construct -t argus-recon:newest .; docker run …Containers

The CLI screenshot reveals the module menu clearly.

Launch with argus, listing modules with “modules”, choose by way of “use 1”, set goal like “set goal instance.com”, then “run”. Instructions embody “runall infra” for classes and “present api_status” for integrations.

Configure API keys for Shodan, VirusTotal, and Censys in settings.py or env vars. Export outputs as TXT, CSV, or JSON. Model 2.0 breaks from legacy 1.x by including 25+ instructions, multi-threading, and UI enhancements.

Safety consultants reward its breadth for crimson teaming and OSINT, decreasing device sprawl. At all times receive permission; the device features a authorized disclaimer in opposition to misuse. Argus simplifies recon workflows for pentesters and analysts.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Gathering, Information, Pythonpowered, Reconnaissance, Toolkit

Post navigation

Previous Post: Google’s Vertex AI Vulnerability Enables Low-Privileged Users to Gain Service Agent Roles
Next Post: Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available

Related Posts

Mozilla Addresses 37 Security Flaws with Firefox 149 Release Mozilla Addresses 37 Security Flaws with Firefox 149 Release Cyber Security News
Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant \Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
GhostClaw Malware Targets macOS Users with AI Tools GhostClaw Malware Targets macOS Users with AI Tools Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News
Quantum Threats Preparing Your Encryption Strategy Quantum Threats Preparing Your Encryption Strategy Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark