Skip to content

CMLKevin/ClaudeCode_ARGBuster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

16 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ClaudeCode ARGBuster v2.0.0

Advanced ARG (Alternate Reality Game) investigation toolkit for Claude Code. Specialized agents for steganography, cryptanalysis, OSINT, media forensics, web analysis, and timeline reconstruction.

Philosophy

Investigate directly first, search community later. ARGBuster's agents probe, analyze, decode, and follow puzzle chains themselves before looking up existing solutions. This ensures original discovery and avoids spoilers.

Architecture

ARGBuster uses Claude Code's flat agent architecture β€” no hierarchical orchestration. Each agent works independently, reports findings with structured output, and recommends which agent Claude Code should spawn next.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ FLAT AGENT ARCHITECTURE β”‚ β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€ β”‚ β”‚ β”‚ User Request β”‚ β”‚ β”‚ β”‚ β”‚ β–Ό β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ Claude β”‚ Decides which specialist to spawn based on input β”‚ β”‚ β”‚ Code β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β–Ό Spawns ONE agent at a time β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ SELF-SUFFICIENT AGENTS (work independently) β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ β”‚ β”‚ stego β”‚ β”‚ crypto β”‚ β”‚ osint β”‚ β”‚ media β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ analyst β”‚ β”‚ decoder β”‚ β”‚ recon β”‚ β”‚ forensic β”‚ β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ β”‚ β”‚ web β”‚ β”‚ arg β”‚ β”‚ timeline β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ analyst β”‚ β”‚orchestr. β”‚ β”‚ reconstr.β”‚ β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β–Ό Returns structured findings β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ Claude β”‚ Reads report, decides next agent to spawn β”‚ β”‚ β”‚ Code β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β–Ό Spawns next recommended agent... β”‚ β”‚ β”‚ β”‚ πŸ“ ~/Downloads/${ARG_NAME}_ARG_Investigation/ β”‚ β”‚ └── All findings saved to ARG-specific folder β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ 

Agents (7)

Agent Model Color Purpose
arg-orchestrator opus magenta Investigation guide + direct browser recon
web-analyst opus blue HTML source, JavaScript, hidden elements, path fuzzing
crypto-decoder opus yellow 50+ cipher types, multi-layer decoding, automated cracking
stego-analyst opus cyan LSB extraction, spectrograms, color channel analysis
media-forensics opus red File forensics, binwalk, metadata, QR/OCR
osint-recon opus green WHOIS, DNS, crt.sh, Wayback Machine, username search
timeline-reconstructor opus white Temporal analysis, narrative reconstruction, event correlation

Commands (4)

Command Description
/arg [target] Full ARG investigation workflow β€” spawns agents in parallel
/decode [text] Quick multi-encoding decode (Base64, ROT, hex, Atbash, Morse, A1Z26)
/stego:spectrogram [audio] Generate 5+ spectrogram variants from audio
/sweep [--install] Check/install all required ARG analysis tool dependencies

Skills (4)

Skill Description
arg-patterns Common ARG hiding techniques and puzzle patterns
cipher-identification Quick cipher type identification by character set
puzzle-chain-tracking Multi-stage investigation state management
timeline-reconstruction Temporal pattern analysis and event correlation

Helper Scripts (2)

Script Description
lsb-extract.py LSB steganography extraction with entropy analysis, sweep mode, bit-plane visualization, zlib decompression, and multiple extraction orders (row/col/zigzag)
metadata-extract.sh Comprehensive metadata extraction with SHA256, GPS coordinate extraction, entropy analysis, deep mode, and support for images/audio/video/PDF

Installation

1. Clone the repository

git clone https://github.com/CMLKevin/ClaudeCode_ARGBuster.git

2. Install as Claude Code plugin

Option A: Run with --plugin-dir

claude --plugin-dir ./ClaudeCode_ARGBuster

Option B: Install to local plugins

mkdir -p ~/.claude/plugins/local cp -r ClaudeCode_ARGBuster ~/.claude/plugins/local/arg-investigation

Then enable in ~/.claude/settings.json:

{ "enabledPlugins": { "arg-investigation@local": true } }

3. Install required tools

Run the built-in dependency checker:

/sweep --install 

Or install manually:

# macOS (Homebrew) brew install exiftool binwalk sox ffmpeg zbar tesseract imagemagick foremost mediainfo pngcheck poppler jq wget # Python pip3 install pillow

4. Recommended permissions

Add to ~/.claude/settings.json for frictionless investigation:

{ "permissions": { "allow": [ "Bash(curl:*)", "Bash(wget:*)", "Bash(exiftool:*)", "Bash(binwalk:*)", "Bash(sox:*)", "Bash(ffprobe:*)", "Bash(ffmpeg:*)", "Bash(tesseract:*)", "Bash(zbarimg:*)", "Bash(strings:*)", "Bash(xxd:*)", "Bash(file:*)", "Bash(convert:*)", "Bash(dig:*)", "Bash(whois:*)", "Bash(foremost:*)", "Bash(mediainfo:*)", "Bash(pdftotext:*)", "Bash(python3:*)", "Bash(base64:*)", "Bash(md5:*)", "Bash(shasum:*)", "Bash(mkdir:*)", "Bash(brew install:*)", "Bash(pip3 install:*)" ] } }

Usage

Start an investigation

/arg https://mysterious-arg.com 

Quick decode

/decode SGVsbG8gV29ybGQ= /decode ".... . .-.. .-.. ---" 

Analyze audio

/stego:spectrogram ~/Downloads/mysterious_audio.ogg 

Check dependencies

/sweep /sweep --install 

LSB extraction with sweep mode

python3 scripts/lsb-extract.py image.png --sweep python3 scripts/lsb-extract.py image.png 1 r --mode=col --entropy python3 scripts/lsb-extract.py image.png --bitplane python3 scripts/lsb-extract.py image.png 2 all --decompress

Deep metadata analysis

bash scripts/metadata-extract.sh suspicious_file.png --deep

Investigation Folder Structure

Each ARG creates its own organized folder:

~/Downloads/${ARG_NAME}_ARG_Investigation/ β”œβ”€β”€ extracted/ β†’ Downloaded files, binwalk extractions β”œβ”€β”€ spectrograms/ β†’ Audio spectrograms at multiple ranges β”œβ”€β”€ clues/ β†’ KEY FINDINGS from all agents β”‚ β”œβ”€β”€ MASTER_INDEX.md β”‚ β”œβ”€β”€ decoded_messages.txt β”‚ β”œβ”€β”€ discovered_urls.txt β”‚ β”œβ”€β”€ hidden_content.txt β”‚ └── encoded_strings.txt β”œβ”€β”€ timeline/ β†’ Chronological event maps β”œβ”€β”€ reports/ β†’ Investigation reports └── logs/ β†’ Raw data dumps 

What's New in v2.0.0

  • New agent: timeline-reconstructor for temporal analysis and narrative reconstruction
  • New command: /sweep for checking and installing all tool dependencies
  • New skill: timeline-reconstruction for temporal pattern analysis
  • Improved /decode: Added Atbash, A1Z26, and Morse code decoding; fixed timestamp bug
  • Improved lsb-extract.py: Added --sweep mode, --entropy analysis, --bitplane visualization, --decompress for zlib, --mode=col/zigzag extraction orders, file signature detection, email/GPS pattern matching
  • Improved metadata-extract.sh: Added SHA256 hashing, GPS coordinate extraction with Google Maps links, entropy analysis, video support, deep mode (--deep), JPEG/PNG EOF data detection, EXIF thumbnail extraction
  • Fixed: decode.md timestamp bug (was creating multiple output files per run)
  • Fixed: stego-analyst hardcoded paths now use $ARG_DIR consistently
  • Updated: Plugin version and metadata

Required External Tools

Category Tools
Core exiftool, binwalk, foremost, strings, xxd, file
Image imagemagick (convert), zbar (zbarimg), tesseract, pngcheck
Audio/Video sox, ffmpeg/ffprobe, mediainfo
Network curl, wget, dig, whois, jq
Documents poppler (pdftotext, pdfimages, pdfdetach)
Python pillow (PIL)

Author

Kevin Lin

License

MIT

About

Advanced ARG investigation toolkit for Claude Code with specialized agents for steganography, cryptanalysis, OSINT, media forensics, and web analysis.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors