Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

amass updates #934

Open
wants to merge 84 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
84 commits
Select commit Hold shift + click to select a range
f3be3c4
Update install.md
joseguzman1337 Aug 9, 2019
ac72310
Update install.md
joseguzman1337 Aug 9, 2019
067e2e9
Update install.md
joseguzman1337 Aug 9, 2019
461fea2
Update README.md
joseguzman1337 Aug 11, 2019
6862d12
Update install.md
joseguzman1337 Aug 21, 2019
954fe1b
Update install.md
joseguzman1337 Aug 21, 2019
0f77c56
Update install.md
joseguzman1337 Aug 21, 2019
8f367dc
Update install.md
joseguzman1337 Sep 29, 2019
cec5db4
Update install.md
joseguzman1337 Oct 16, 2019
572cda0
Update install.md
joseguzman1337 Oct 16, 2019
de82185
Update install.md
joseguzman1337 Oct 16, 2019
32058c0
Update install.md
joseguzman1337 Oct 16, 2019
5de6edb
Update install.md
joseguzman1337 Oct 16, 2019
9b17494
Update install.md
joseguzman1337 Feb 8, 2020
eb1e417
Update install.md
joseguzman1337 Apr 28, 2020
f812668
Create Dependabot config file
dependabot-preview[bot] Oct 13, 2020
4dfcef1
Bump github.com/google/uuid from 1.1.1 to 1.1.2
dependabot-preview[bot] Oct 13, 2020
5a57103
Bump github.com/PuerkitoBio/goquery from 1.5.0 to 1.6.0
dependabot-preview[bot] Oct 14, 2020
021f013
Merge pull request #8 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Oct 14, 2020
a9b634e
Bump github.com/miekg/dns from 1.1.15 to 1.1.33
dependabot-preview[bot] Oct 14, 2020
0141bc1
Merge pull request #7 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Oct 16, 2020
4417f4e
Bump github.com/miekg/dns from 1.1.33 to 1.1.34
dependabot-preview[bot] Oct 19, 2020
9f87a67
Merge pull request #9 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Oct 19, 2020
d629c67
Bump github.com/miekg/dns from 1.1.34 to 1.1.35
dependabot-preview[bot] Oct 26, 2020
e4644fe
Merge pull request #10 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Oct 27, 2020
d5edc72
Bump github.com/fatih/color from 1.7.0 to 1.10.0
dependabot-preview[bot] Nov 2, 2020
360ecfb
Merge pull request #11 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Nov 3, 2020
c684eff
Bump github.com/go-ini/ini from 1.44.0 to 1.62.0
dependabot-preview[bot] Nov 3, 2020
faf64fc
Bump github.com/lib/pq from 1.2.0 to 1.9.0
dependabot-preview[bot] Dec 2, 2020
15c3e22
Merge pull request #12 from 4k4xs4pH1r3/dependabot/go_modules/github.…
dependabot-preview[bot] Dec 9, 2020
9c6b728
Bump github.com/cayleygraph/cayley from 0.7.5 to 0.7.7
dependabot-preview[bot] Dec 9, 2020
d698aba
Merge pull request #5 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Dec 13, 2020
ab0ddcd
Merge pull request #3 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Dec 13, 2020
bf110fc
Merge pull request #2 from 4k4xs4pH1r3/dependabot/go_modules/github.c…
joseguzman1337 Dec 13, 2020
7bed4ed
Merge pull request #1 from 4k4xs4pH1r3/dependabot/add-v2-config-file
joseguzman1337 Dec 13, 2020
4524a05
Create SECURITY.md
joseguzman1337 Dec 13, 2020
476eadd
Create codeql-analysis.yml
joseguzman1337 Dec 13, 2020
4c5af9b
Create anchore-analysis.yml
joseguzman1337 Dec 13, 2020
67fd500
Create trivy-analysis.yml
joseguzman1337 Dec 13, 2020
81d111a
Create snyk-analysis.yml
joseguzman1337 Dec 13, 2020
a952590
Create veracode-analysis.yml
joseguzman1337 Dec 13, 2020
f0edcd6
Bump github.com/jmoiron/sqlx from 1.2.0 to 1.3.4
dependabot[bot] May 17, 2021
e53fbe7
Add .whitesource configuration file
mend-bolt-for-github[bot] Dec 30, 2021
2ed41b8
fix: Dockerfile to reduce vulnerabilities
snyk-bot Mar 18, 2022
a17da12
fix: Dockerfile to reduce vulnerabilities
snyk-bot Apr 6, 2022
8fcf5fd
Merge pull request #31 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
be114fd
Bump github.com/google/uuid from 1.1.2 to 1.3.0
dependabot[bot] Apr 11, 2022
0507422
Bump github.com/go-ini/ini from 1.62.0 to 1.66.4
dependabot[bot] Apr 11, 2022
e772dbe
Bump github.com/lib/pq from 1.9.0 to 1.10.5
dependabot[bot] Apr 11, 2022
280a4eb
Merge pull request #36 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
e2b7435
Merge pull request #60 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
869a2cc
Merge pull request #59 from 4k4xs4pH1r3/snyk-fix-57a37e379a06b4c222a0…
joseguzman1337 Apr 11, 2022
b3a72c8
Bump github.com/miekg/dns from 1.1.35 to 1.1.48
dependabot[bot] Apr 11, 2022
1803e32
Merge pull request #54 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
6920674
Merge pull request #58 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
a3cf587
Bump github.com/fatih/color from 1.10.0 to 1.13.0
dependabot[bot] Apr 11, 2022
1a9b6f1
Merge pull request #42 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
d8f6037
Bump github.com/PuerkitoBio/goquery from 1.6.0 to 1.8.0
dependabot[bot] Apr 11, 2022
be6ef54
Merge pull request #43 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Apr 11, 2022
3f17b06
Merge pull request #51 from 4k4xs4pH1r3/whitesource/configure
joseguzman1337 Apr 11, 2022
91624fc
Merge branch 'master' into snyk-fix-177626f550aee64f8bc3ce691fff6ee6
joseguzman1337 Apr 13, 2022
d32566d
Merge pull request #56 from 4k4xs4pH1r3/snyk-fix-177626f550aee64f8bc3…
joseguzman1337 Apr 13, 2022
0af919c
Bump github.com/jmoiron/sqlx from 1.3.4 to 1.3.5
dependabot[bot] Apr 18, 2022
fd2e5b7
Bump github.com/go-ini/ini from 1.66.4 to 1.67.0
dependabot[bot] Aug 9, 2022
cd22bf8
Bump github.com/PuerkitoBio/goquery from 1.8.0 to 1.8.1
dependabot[bot] Feb 20, 2023
03166d3
Bump github.com/fatih/color from 1.13.0 to 1.15.0
dependabot[bot] Mar 13, 2023
bdec7e0
Bump github.com/miekg/dns from 1.1.48 to 1.1.53
dependabot[bot] Mar 29, 2023
e1f395b
Bump golang.org/x/oauth2 from 0.0.0-20190604053449-0f29369cfe45 to 0.7.0
dependabot[bot] Apr 10, 2023
51f088a
Bump github.com/lib/pq from 1.10.5 to 1.10.8
dependabot[bot] Apr 17, 2023
f00f332
Merge branch 'master' into dependabot/go_modules/github.com/jmoiron/s…
joseguzman1337 Jul 20, 2023
0fa68c2
Merge pull request #61 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
9c0399a
Merge branch 'master' into dependabot/go_modules/github.com/go-ini/in…
joseguzman1337 Jul 20, 2023
cc8a8c0
Merge pull request #67 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
2b7c493
Merge branch 'master' into dependabot/go_modules/github.com/PuerkitoB…
joseguzman1337 Jul 20, 2023
b98926b
Merge pull request #71 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
2f35887
Merge branch 'master' into dependabot/go_modules/github.com/fatih/col…
joseguzman1337 Jul 20, 2023
241dd6d
Merge pull request #76 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
f23e8a8
Merge branch 'master' into dependabot/go_modules/github.com/miekg/dns…
joseguzman1337 Jul 20, 2023
7a6e978
Merge pull request #78 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
9525cfe
Merge branch 'master' into dependabot/go_modules/golang.org/x/oauth2-…
joseguzman1337 Jul 20, 2023
2c35f51
Merge pull request #79 from 4k4xs4pH1r3/dependabot/go_modules/golang.…
joseguzman1337 Jul 20, 2023
f60f232
Merge branch 'master' into dependabot/go_modules/github.com/lib/pq-1.…
joseguzman1337 Jul 20, 2023
72fd41d
Merge pull request #80 from 4k4xs4pH1r3/dependabot/go_modules/github.…
joseguzman1337 Jul 20, 2023
5416395
Merge branch 'master' into amass-updated
joseguzman1337 Jul 21, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .dccache

Large diffs are not rendered by default.

7 changes: 7 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
version: 2
updates:
- package-ecosystem: gomod
directory: "/"
schedule:
interval: daily
open-pull-requests-limit: 10
25 changes: 25 additions & 0 deletions .github/workflows/anchore-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# This workflow checks out code, builds an image, performs a container image
# vulnerability scan with Anchore's Grype tool, and integrates the results with GitHub Advanced Security
# code scanning feature. For more information on the Anchore scan action usage
# and parameters, see https://github.com/anchore/scan-action. For more
# information on Anchore's container image scanning tool Grype, see
# https://github.com/anchore/grype
name: Anchore Container Scan
on: push
jobs:
Anchore-Build-Scan:
runs-on: ubuntu-latest
steps:
- name: Checkout the code
uses: actions/checkout@v2
- name: Build the Docker image
run: docker build . --file Dockerfile --tag localbuild/testimage:latest
- name: Run the Anchore scan action itself with GitHub Advanced Security code scanning integration enabled
uses: anchore/scan-action@main
with:
image: "localbuild/testimage:latest"
acs-report-enable: true
- name: Upload Anchore Scan Report
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: results.sarif
67 changes: 67 additions & 0 deletions .github/workflows/codeql-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"

on:
push:
branches: [ master ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ master ]
schedule:
- cron: '45 18 * * 6'

jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest

strategy:
fail-fast: false
matrix:
language: [ 'go' ]
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python' ]
# Learn more:
# https://docs.github.com/en/free-pro-team@latest/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#changing-the-languages-that-are-analyzed

steps:
- name: Checkout repository
uses: actions/checkout@v2

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v1
with:
languages: ${{ matrix.language }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main

# Autobuild attempts to build any compiled languages (C/C++, C#, or Java).
# If this step fails, then you should remove it and run the build manually (see below)
- name: Autobuild
uses: github/codeql-action/autobuild@v1

# ℹ️ Command-line programs to run using the OS shell.
# 📚 https://git.io/JvXDl

# ✏️ If the Autobuild fails above, remove it and uncomment the following three lines
# and modify them (or add more) to build your code if your project
# uses a compiled language

#- run: |
# make bootstrap
# make release

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v1
34 changes: 34 additions & 0 deletions .github/workflows/snyk-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
# A sample workflow which checks out the code, builds a container
# image using Docker and scans that image for vulnerabilities using
# Snyk. The results are then uploaded to GitHub Security Code Scanning
#
# For more examples, including how to limit scans to only high-severity
# issues, monitor images for newly disclosed vulnerabilities in Snyk and
# fail PR checks for new vulnerabilities, see https://github.com/snyk/actions/

name: Snyk Container
on: push
jobs:
snyk:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Build a Docker image
run: docker build -t your/image-to-test .
- name: Run Snyk to check Docker image for vulnerabilities
# Snyk can be used to break the build when it detects vulnerabilities.
# In this case we want to upload the issues to GitHub Code Scanning
continue-on-error: true
uses: snyk/actions/docker@master
env:
# In order to use the Snyk Action you will need to have a Snyk API token.
# More details in https://github.com/snyk/actions#getting-your-snyk-token
# or you can signup for free at https://snyk.io/login
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
image: your/image-to-test
args: --file=Dockerfile
- name: Upload result to GitHub Code Scanning
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: snyk.sarif
30 changes: 30 additions & 0 deletions .github/workflows/trivy-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
name: build
on:
push:
branches: [ master ]
pull_request:
jobs:
build:
name: Build
runs-on: "ubuntu-18.04"
steps:
- name: Checkout code
uses: actions/checkout@v2

- name: Build an image from Dockerfile
run: |
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
format: 'template'
template: '@/contrib/sarif.tpl'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: 'trivy-results.sarif'
60 changes: 60 additions & 0 deletions .github/workflows/veracode-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
# This workflow will initiate a Veracode Static Analysis Pipeline scan, return a results.json and convert to SARIF for upload as a code scanning alert

name: Veracode Static Analysis Pipeline Scan

# Controls when the action will run. Triggers the workflow on push or pull request
# events but only for the master branch
on:
push:
branches: [ master ]
pull_request:
branches: [ master ]

# A workflow run is made up of one or more jobs that can run sequentially or in parallel
jobs:
# This workflow contains a job to build and submit pipeline scan, you will need to customize the build process accordingly and make sure the artifact you build is used as the file input to the pipeline scan file parameter
build-and-pipeline-scan:
# The type of runner that the job will run on
runs-on: ubuntu-latest
steps:

# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it and copies all sources into ZIP file for submitting for analysis. Replace this section with your applications build steps
- uses: actions/checkout@v2
with:
repository: ''

- uses: papeloto/action-zip@v1
with:
files: /
recursive: true
dest: veracode-pipeline-scan-results-to-sarif.zip

- uses: actions/upload-artifact@v1
with:
name: my-artifact
path: veracode-pipeline-scan-results-to-sarif.zip

# download the Veracode Static Analysis Pipeline scan jar
- uses: wei/curl@master
with:
args: -O https://downloads.veracode.com/securityscan/pipeline-scan-LATEST.zip
- run: unzip -o pipeline-scan-LATEST.zip

- uses: actions/setup-java@v1
with:
java-version: 1.8
- run: java -jar pipeline-scan.jar --veracode_api_id "${{secrets.VERACODE_API_ID}}" --veracode_api_key "${{secrets.VERACODE_API_KEY}}" --fail_on_severity="Very High, High" --file veracode-pipeline-scan-results-to-sarif.zip
continue-on-error: true
- uses: actions/upload-artifact@v1
with:
name: ScanResults
path: results.json
- name: Convert pipeline scan output to SARIF format
id: convert
uses: veracode/veracode-pipeline-scan-results-to-sarif@master
with:
pipeline-results-json: results.json
- uses: github/codeql-action/upload-sarif@v1
with:
# Path to SARIF file relative to the root of the repository
sarif_file: veracode-results.sarif
12 changes: 12 additions & 0 deletions .whitesource
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
{
"scanSettings": {
"baseBranches": []
},
"checkRunSettings": {
"vulnerableCheckRunConclusionLevel": "failure",
"displayMode": "diff"
},
"issueSettings": {
"minSeverityLevel": "LOW"
}
}
1 change: 0 additions & 1 deletion Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ RUN apk --no-cache add git
WORKDIR /go/src/github.com/owasp-amass/amass
COPY . .
RUN go install -v ./...

FROM alpine:latest
RUN apk --no-cache add ca-certificates
COPY --from=build /go/bin/amass /bin/amass
Expand Down
81 changes: 81 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -128,4 +128,85 @@ Add it to our ever-growing list of [REFERENCES.md](REFERENCES.md) by forking and

This program is free software: you can redistribute it and/or modify it under the terms of the [Apache license](LICENSE). OWASP Amass and any contributions are Copyright © by Jeff Foley 2017-2023. Some subcomponents have separate licenses.

## Documentation

Use the [Installation Guide](https://github.com/4k4xs4pH1r3/Amass/blob/master/doc/install.md) to get started.

Go to the [User's Guide](https://github.com/OWASP/Amass/blob/master/doc/user_guide.md) for additional information.

## Community

Join our Discord server: [![Chat on Discord](https://img.shields.io/discord/433729817918308352.svg?logo=discord)](https://discord.gg/rtN8GMd)

### Project Leader

[![Follow on Twitter](https://img.shields.io/twitter/follow/jeff_foley.svg?logo=twitter)](https://twitter.com/jeff_foley)

* OWASP: [Caffix](https://www.owasp.org/index.php/User:Caffix)
* GitHub: [@caffix](https://github.com/caffix)

### Contributors

This project improves thanks to all the people who contribute:

[![Follow on Twitter](https://img.shields.io/twitter/follow/emtunc.svg?logo=twitter)](https://twitter.com/emtunc)
[![Follow on Twitter](https://img.shields.io/twitter/follow/kalbasit.svg?logo=twitter)](https://twitter.com/kalbasit)
[![Follow on Twitter](https://img.shields.io/twitter/follow/fork_while_fork.svg?logo=twitter)](https://twitter.com/fork_while_fork)
[![Follow on Twitter](https://img.shields.io/twitter/follow/rbadguy1.svg?logo=twitter)](https://twitter.com/rbadguy1)
[![Follow on Twitter](https://img.shields.io/twitter/follow/danjomart.svg?logo=twitter)](https://twitter.com/danjomart)
[![Follow on Twitter](https://img.shields.io/twitter/follow/shane_ditton.svg?logo=twitter)](https://twitter.com/shane_ditton)
[![Follow on Twitter](https://img.shields.io/twitter/follow/dhauenstein.svg?logo=twitter)](https://twitter.com/dhauenstein)
[![Follow on Twitter](https://img.shields.io/twitter/follow/THB_STX.svg?logo=twitter)](https://twitter.com/THB_STX)
[![Email NanoDano](https://img.shields.io/badge/NanoDano-nanodano%40devdungeon.com-blue.svg)](mailto:nanodano@devdungeon.com)
[![Follow on Twitter](https://img.shields.io/twitter/follow/DanielMiessler.svg?logo=twitter)](https://twitter.com/DanielMiessler)
[![Follow on Twitter](https://img.shields.io/twitter/follow/sec_for_safety.svg?logo=twitter)](https://twitter.com/sec_for_safety)
[![Follow on Twitter](https://img.shields.io/twitter/follow/ngkogkos.svg?logo=twitter)](https://github.com/ngkogkos)
[![Follow on Twitter](https://img.shields.io/twitter/follow/Jhaddix.svg?logo=twitter)](https://twitter.com/Jhaddix)
[![Follow on Twitter](https://img.shields.io/twitter/follow/Vltraheaven.svg?logo=twitter)](https://twitter.com/Vltraheaven)

## Mentions

* [8 Free Tools to Be Showcased at Black Hat and DEF CON](https://www.darkreading.com/application-security/8-free-tools-to-be-showcased-at-black-hat-and-def-con/d/d-id/1335356?image_number=5)
* [amass — Automated Attack Surface Mapping](https://danielmiessler.com/study/amass/)
* [Aquatone — A Tool for Domain Flyovers](https://github.com/michenriksen/aquatone)
* [Collaborating with the Crowd – Recapping LevelUp 0X04](https://www.bugcrowd.com/blog/recapping_levelup_0x04/)
* [Subdomain Enumeration: 2019 Workflow](https://0xpatrik.com/subdomain-enumeration-2019/)
* [REMOTE CODE EXECUTION ! 😜 Recon Wins](https://medium.com/@vishnu0002/remote-code-execution-recon-wins-e9c1db79f3da)
* [Where You’ll Find Us: An Overview of SecurityTrails Integrations](https://securitytrails.com/blog/integrations-overview)
* [Web tools, or where to start a pentester?](https://habr.com/en/company/dsec/blog/452836/)
* [Tool for detailed DNS enumeration and creation of network infrastructure maps](https://www.gurudelainformatica.es/2019/05/herramienta-para-enumeracion-detallada.html)
* [Top 7 Subdomain Scanner Tools: Find Subdomains in Seconds](https://securitytrails.com/blog/subdomain-scanner-find-subdomains)
* [Cyber Talent Gap: How to Do More With Less](https://www.digitalshadows.com/blog-and-research/cyber-talent-gap-how-to-do-more-with-less/)
* [My Recon Process — DNS Enumeration](https://medium.com/@noobhax/my-recon-process-dns-enumeration-d0e288f81a8a)
* [Week in OSINT #2019–16: From OSINT for pentesting, to OCR and OWASP](https://medium.com/week-in-osint/week-in-osint-2019-16-8ccfe0da1a70)
* [Stop Using Python for Subdomain Enumeration](http://sec.alexflor.es/post/subdomain_enum/)
* [My Personal OSINT Techniques, Part 1 of 2: Key & Layer, Contingency Seeding](https://0x00sec.org/t/my-personal-osint-techniques-part-1-of-2-key-layer-contingency-seeding/)
* [Subdomain Enumeration Tools – 2019 Update](https://www.yeahhub.com/subdomain-enumeration-tools-2019-update/)
* [Leaked Salesforce API access token at IDEA.com](https://medium.com/@jonathanbouman/leaked-salesforce-api-access-token-at-ikea-com-132eea3844e0)
* [Week in OSINT #2019–11: This time a collection of mostly tools and sites](https://medium.com/week-in-osint/week-in-osint-2019-11-62774ffe7a2)
* [Bug Hunting Methodology (part-1)](https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066)
* [100 ways to discover (part 1)](https://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/)
* [Pose a Threat: How Perceptual Analysis Helps Bug Hunters](https://www.bishopfox.com/news/2018/12/appsec-california-pose-a-threat-how-perpetual-analysis-helps-bug-hunters/)
* [A penetration tester’s guide to subdomain enumeration](https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6)
* [Abusing access control on a large online e-commerce site to register as supplier](https://medium.com/@fbotes2/governit-754becf85cbc)
* [Black Hat Training, Making the Cloud Rain Shells!: Discovery and Recon](https://www.blackhat.com/eu-18/training/schedule/index.html#aws--azure-exploitation-making-the-cloud-rain-shells-11060)
* [Subdomains Enumeration Cheat Sheet](https://pentester.land/cheatsheets/2018/11/14/subdomains-enumeration-cheatsheet.html)
* [Search subdomains and build graphs of network structure with Amass](https://miloserdov.org/?p=2309)
* [Getting started in Bug Bounty](https://medium.com/@ehsahil/getting-started-in-bug-bounty-7052da28445a)
* [Source code disclosure via exposed .git folder](https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html)
* [Amass, the best application to search for subdomains](https://www.h1rd.com/hacking/amass-para-buscar-subdominios)
* [Subdomain Takeover: Finding Candidates](https://0xpatrik.com/subdomain-takeover-candidates/)
* [Paul's Security Weekly #564: Technical Segment - Bug Bounty Hunting](https://wiki.securityweekly.com/Episode564)
* [The Bug Hunters Methodology v3(ish)](https://www.youtube.com/watch?v=Qw1nNPiH_Go)
* [Doing Recon the Correct Way](https://enciphers.com/doing-recon-the-correct-way/)
* [Discovering subdomains](https://www.sjoerdlangkemper.nl/2018/06/20/discovering-subdomains/)
* [Asset Discovery: Doing Reconnaissance the Hard Way](https://0xpatrik.com/asset-discovery/)
* [Project Sonar: An Underrated Source of Internet-wide Data](https://0xpatrik.com/project-sonar-guide/)
* [Top Five Ways the Red Team breached the External Perimeter](https://medium.com/@adam.toscher/top-five-ways-the-red-team-breached-the-external-perimeter-262f99dc9d17)

## Stargazers over Time

[![Stargazers over Time](https://starcharts.herokuapp.com/OWASP/Amass.svg)](https://starcharts.herokuapp.com/OWASP/Amass)

![Network graph](./images/network_06092018.png "Amass Network Mapping")

21 changes: 21 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
# Security Policy

## Supported Versions

Use this section to tell people about which versions of your project are
currently being supported with security updates.

| Version | Supported |
| ------- | ------------------ |
| 5.1.x | :white_check_mark: |
| 5.0.x | :x: |
| 4.0.x | :white_check_mark: |
| < 4.0 | :x: |

## Reporting a Vulnerability

Use this section to tell people how to report a vulnerability.

Tell them where to go, how often they can expect to get an update on a
reported vulnerability, what to expect if the vulnerability is accepted or
declined, etc.
Loading