# Amass
**Repository Path**: csharphpython/Amass
## Basic Information
- **Project Name**: Amass
- **Description**: In-depth Attack Surface Mapping and Asset Discovery
- **Primary Language**: Unknown
- **License**: Apache-2.0
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2020-10-10
- **Last Updated**: 2024-06-18
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
# [ OWASP Amass](https://owasp.org/www-project-amass/)
[](https://owasp.org/projects/#sec-flagships)
[](https://github.com/OWASP/Amass/releases)
[](https://github.com/OWASP/Amass/releases/latest)
[](https://hub.docker.com/r/caffix/amass)
[](https://twitter.com/owaspamass)
[](https://discord.gg/rtN8GMd)
[](https://pkg.go.dev/github.com/OWASP/Amass/v3?tab=overview)
[](https://www.apache.org/licenses/LICENSE-2.0)
[](https://circleci.com/gh/OWASP/Amass/tree/master)
[](https://goreportcard.com/report/github.com/OWASP/Amass)
[](https://www.codefactor.io/repository/github/OWASP/Amass)
[](https://codeclimate.com/github/OWASP/Amass/maintainability)
[](https://codecov.io/gh/OWASP/Amass)
The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
**Information Gathering Techniques Used:**
| Technique | Data Sources |
|:-------------|:-------------|
| DNS | Brute forcing, Reverse DNS sweeping, NSEC zone walking, Zone transfers, FQDN alterations/permutations, FQDN Similarity-based Guessing |
| Scraping | Ask, Baidu, Bing, BuiltWith, DNSDumpster, HackerOne, RapidDNS, Riddler, SiteDossier, ViewDNS, Yahoo |
| Certificates | Active pulls (optional), Censys, CertSpotter, Crtsh, FacebookCT, GoogleCT |
| APIs | AlienVault, BinaryEdge, BufferOver, C99, CIRCL, Cloudflare, CommonCrawl, DNSDB, GitHub, HackerTarget, IPToASN, Mnemonic, NetworksDB, PassiveTotal, Pastebin, RADb, ReconDev, Robtex, SecurityTrails, ShadowServer, Shodan, Spyse, Sublist3rAPI, TeamCymru, ThreatCrowd, ThreatMiner, Twitter, Umbrella, URLScan, VirusTotal, WhoisXML, ZETAlytics, ZoomEye |
| Web Archives | ArchiveIt, LoCArchive, UKGovArchive, Wayback |
----
## Installation [](https://golang.org/dl/) [](https://hub.docker.com/r/caffix/amass) [](https://github.com/OWASP/Amass/releases/latest)
> You can find some additional installation variations in the [Installation Guide](./doc/install.md).
### Prebuilt Packages
1. Simply unzip the [package](https://github.com/OWASP/Amass/releases/latest)
2. Put the precompiled binary into your path
3. Start using OWASP Amass!
#### Homebrew
```bash
brew tap caffix/amass
brew install amass
```
#### Snapcraft
```bash
sudo snap install amass
```
### Docker Container
1. Install [Docker](https://www.docker.com)
2. Pull the Docker image by running `docker pull caffix/amass`
3. Run `docker run -v OUTPUT_DIR_PATH:/.config/amass/ caffix/amass --version`
The volume argument allows the Amass graph database to persist between executions and output files to be accessed on the host system. The first field (left of the colon) of the volume option is the amass output directory that is external to Docker, while the second field is the path, internal to Docker, where amass will write the output files.
The wordlists maintained in the Amass git repository are available in `/examples/wordlists/` within the docker container. For example, to use `all.txt`:
```bash
docker run -v OUTPUT_DIR_PATH:/.config/amass/ caffix/amass enum -brute -w /wordlists/all.txt -d example.com
```
### From Sources
1. Install [Go](https://golang.org/doc/install) and setup your Go workspace
2. Add the Go Module environment variable by running `export GO111MODULE=on`
3. Download OWASP Amass by running `go get -v github.com/OWASP/Amass/v3/...`
4. At this point, the binary should be in `$GOPATH/bin`
## Documentation [](https://pkg.go.dev/github.com/OWASP/Amass/v3?tab=overview)
Use the [Installation Guide](./doc/install.md) to get started.
Go to the [User's Guide](./doc/user_guide.md) for additional information.
See the [Tutorial](./doc/tutorial.md) for example usage.
See the [Amass Scripting Engine Manual](./doc/scripting.md) for greater control over your enumeration process.
## Troubleshooting [](https://discord.gg/rtN8GMd)
If you need help with installation and/or usage of the tool, please join our [Discord server](https://discord.gg/rtN8GMd) where community members can best try to help you.
:stop_sign: **Please avoid opening GitHub issues for support requests or questions!**
## Contributing [](./CONTRIBUTING.md) [](https://discord.gg/rtN8GMd)
We are always happy to get new contributors on board! Please check [CONTRIBUTING.md](CONTRIBUTING.md) to learn how to
contribute to our codebase, and join our [Discord Server](https://discord.gg/rtN8GMd) to discuss current project goals.
The OWASP Amass core project team are:
* [Jeff Foley](https://github.com/caffix) aka `caffix`
[](https://twitter.com/jeff_foley)
* [Anthony Rhodes](https://github.com/fork-while-fork) aka `fork-while-fork`
[](https://twitter.com/fork_while_fork)
For a list of all contributors to the OWASP Amass Project please visit our [HALL_OF_FAME.md](HALL_OF_FAME.md).
## References [](https://www.youtube.com/watch?v=C-GabM2db9A) [](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html) [](https://reconvillage.org/) [](https://www.youtube.com/c/RedTeamVillage/featured) [](https://www.twitch.tv/videos/723418873)
Did you write a blog post, magazine article or do a podcast about or mentioning OWASP Amass? Or maybe you held or joined a conference talk or meetup session, a hacking workshop or public training where this project was mentioned?
Add it to our ever-growing list of [REFERENCES.md](REFERENCES.md) by forking and opening a Pull Request!
### Top Mentions
* [Hakluke’s Guide to Amass — How to Use Amass More Effectively for Bug Bounties](https://medium.com/@hakluke/haklukes-guide-to-amass-how-to-use-amass-more-effectively-for-bug-bounties-7c37570b83f7)
* [SecurityTrails | OWASP Amass: A Solid Information Gathering Tool](https://securitytrails.com/blog/owasp-amass)
* [TrustedSec | Upgrade Your Workflow, Part 1: Building OSINT Checklists](https://www.trustedsec.com/blog/upgrade-your-workflow-part-1-building-osint-checklists/)
* [SANS ISC | Offensive Tools Are For Blue Teams Too](https://isc.sans.edu/forums/diary/Offensive+Tools+Are+For+Blue+Teams+Too/25842/)
* [Daniel Miessler | amass — Automated Attack Surface Mapping](https://danielmiessler.com/study/amass/)
* [Dionach | How to Use OWASP Amass: An Extensive Tutorial](https://www.dionach.com/blog/how-to-use-owasp-amass-an-extensive-tutorial/)
* [Jason Haddix | LevelUp 0x02 - The Bug Hunters Methodology v3(ish)](https://www.youtube.com/watch?v=Qw1nNPiH_Go)
* [FireEye | Commando VM 2.0: Customization, Containers, and Kali, Oh My!](https://www.fireeye.com/blog/threat-research/2019/08/commando-vm-customization-containers-kali.html)
* [Hacker Toolbelt | OWASP Amass OSINT Reconnaissance](https://medium.com/hacker-toolbelt/owasp-amass-osint-reconnaissance-9b57d81fb958)
* [ToolWar | Extreme Subdomain Enumeration/Scanning on Windows : OWASP Amass](https://www.youtube.com/watch?v=mEQnVkSG19M)
* [Ghost Lulz | YouTube - Bug Bounty Tips: Amass Recon Tool](https://www.youtube.com/watch?v=QRkKzYH4efI)
* [HackbotOne | 10 Recon Tools For Bug Bounty](https://hackbotone.com/blog/10-recon-tools-for-bug-bounty)
* [Capt. Meelo | Asset Enumeration: Expanding a Target's Attack Surface](https://captmeelo.com/bugbounty/2019/09/02/asset-enumeration.html)
* [Noobhax | My Recon Process — DNS Enumeration](https://medium.com/@noobhax/my-recon-process-dns-enumeration-d0e288f81a8a)
## Licensing [](https://www.apache.org/licenses/LICENSE-2.0)
This program is free software: you can redistribute it and/or modify it under the terms of the [Apache license](LICENSE). OWASP Amass and any
contributions are Copyright © by Jeff Foley 2017-2020.
