Identity resolution · Breach intelligence · Domain recon · Behavioral profiling
Give Argus a name, email, phone, or domain — it fans out across 64 platforms and 19 intelligence sources, cross-correlates everything, and hands you a confidence-scored dossier.
pip install argus-osint # or: uv add argus-osint
argus resolve "Linus Torvalds" # find accounts across 64 platforms┌──────────┬──────────────┬─────────────────────────────────┬────────────┬───────────┐
│ Platform │ Username │ URL │ Confidence │ Label │
├──────────┼──────────────┼─────────────────────────────────┼────────────┼───────────┤
│ github │ torvalds │ https://github.com/torvalds │ 92% │ confirmed │
│ gitlab │ torvalds │ https://gitlab.com/torvalds │ 78% │ likely │
│ keybase │ torvalds │ https://keybase.io/torvalds │ 85% │ confirmed │
│ reddit │ torvalds │ https://reddit.com/u/torvalds │ 45% │ possible │
└──────────┴──────────────┴─────────────────────────────────┴────────────┴───────────┘
# 🔍 Find someone across 64 platforms
argus resolve "Jane Doe" --location "NYC" --email jane@example.com
# 📧 Investigate an email — breaches, PGP keys, Gravatar, linked accounts
argus intel email "john@example.com"
# 🌐 Recon a domain — WHOIS, DNS, certs, subdomains, Wayback history
argus intel domain "example.com"
# 📱 Phone lookup — carrier, country, line type, validation
argus intel phone "+1-555-123-4567"
# 💀 Breach check — Have I Been Pwned, LeakCheck, IntelX
argus intel breach "john@example.com"
# 🖼️ Image analysis — perceptual hash, EXIF extraction
argus intel image "https://example.com/photo.jpg"
# 🕸️ Full correlation — cross-reference everything
argus correlate "John Doe"
# 🧠 Behavioral profiling — interests, activity patterns, writing style
argus profile "John Doe"
# 🔗 Topic linking — find connections to orgs, topics, interests
argus link "John Doe" --topic "machine learning"
# 📄 Generate reports
argus report "John Doe" --format markdown --output report.md|
🔧 Developer
|
📱 Social
|
🎬 Media
|
🌐 Other
|
| Category | Sources | What You Get |
|---|---|---|
| 💀 Breach | Have I Been Pwned · LeakCheck · IntelX | Breached credentials, exposed data types |
| 🌐 Domain | WHOIS · DNS · crt.sh · SecurityTrails | Registration, records, certs, subdomains |
| 🔒 Network | Shodan · VirusTotal · Wayback Machine | Open ports, threat intel, historical snapshots |
| 🪪 Identity | PGP Keyservers · Hunter.io · Libravatar · Gravatar | Keys, email verification, avatars |
| 📋 Records | OpenCorporates · OCCRP Aleph · Google Dorking | Corporate filings, investigations, targeted queries |
| 📞 Comms | Email Validation · Phone Lookup · Paste Search | MX checks, carrier info, paste exposure |
pip install argus-osint # core
pip install argus-osint[intel] # + WHOIS, DNS, phone parsing
pip install argus-osint[playwright] # + browser automation
pip install argus-osint[api] # + REST API server
pip install argus-osint[all] # everything🛠️ Development setup
git clone https://github.com/TomOst-Sec/Argus-OSINT.git
cd Argus-OSINT
uv sync --group dev
uv run pytest tests/ -x # run tests
uv run argus platforms # verify 64 platformsargus config init # creates argus.toml[general]
default_threshold = 0.45
max_concurrent_requests = 10
[stealth]
min_delay = 2.0
max_delay = 5.0
[intel]
hibp_api_key = "" # haveibeenpwned.com ($3.50/mo)
shodan_api_key = "" # shodan.io (free tier)
virustotal_api_key = "" # virustotal.com (free tier)
hunter_api_key = "" # hunter.io (free tier)
enable_breach_check = true
enable_domain_intel = trueEnvironment overrides: ARGUS_INTEL_HIBP_API_KEY=xxx
┌─────────────────────────────────────────┐
│ ARGUS ENGINE │
├─────────────────────────────────────────┤
Name / Email ───► │ Resolver ──► Verification ──► Scoring │ ───► Dossier
Phone / Domain │ │ Engine │ │
│ ▼ ▼ │
│ 64 Platforms 19 Intel Correlation │
│ (parallel) Sources Engine │
├─────────────────────────────────────────┤
│ Stealth Layer: UA rotation, rate limits, │
│ proxy support, Camoufox browser │
└─────────────────────────────────────────┘
Verification signals: photo hash (35%) · bio similarity (20%) · timezone (15%) · username patterns (10%) · connections (10%) · writing style (10%)
argus serve --api --port 8000 # REST API (FastAPI + OpenAPI docs)
argus serve --mcp # MCP server for Claude CodeAlso integrates with LangChain and CrewAI as tool providers.
MIT License · Built for authorized security research, CTF, and OSINT investigations only.
All sources are publicly accessible APIs and legally queryable services. No unauthorized access.