Anubis is a subdomain collection tool. It collects data from various sources including HackerTarget, DNSDumpster, VirusTotal, Google, Pkey and NetCraft.
Anubis has another program that helps it discover subdomains, AnubisDB.
Specifications
- Gathers data from a variety of sources to provide one of the most comprehensive tools for finding subdomains.
- It is able to identify all the key servers behind the domains and export any IP addresses.
- It is also able to extract information from less used but potentially efficient "routes", including DNSSEC subdomain lists and zone transport.
Installation
sudo apt-get install python3-pip python-dev libssl-dev libffi-dev
pip3 install anubis-netsec
ή
git clone https://github.com/jonluca/Anubis.git cd Anubis pip3 install -r requirements.txt pip3 install
Use
Usage: anubis -t TARGET [-o FILENAME] [-noispbarv] [-w SCAN] [-q NUM] anubis -h anubis --version Options: -h --help show this help message and exit -t --target set target (comma separated, no spaces, if multiple) -n --with-nmap perform an nmap service / script scan -o --output save to filename -i --additional-info show additional information about the host from Shodan ( requires API key) -p --ip outputs the resolved IPs for each subdomain, and a full list of unique ips -a --send-to-anubis-db send results to Anubis-DB -r --recursive recursively search over all subdomains -s --ssl run an ssl scan and output cipher + chain info -w --overwrite-nmap-scan SCAN overwrite default nmap scan (default -nPn -sV -sC) -v --verbose print debug info and full request output -q --queue-workers NUM override number of queue workers (default: 10, max: 100) --version show version and exit Help: For help using this tool, please open an issue on the Github repository: https: / /github.com/jonluca/anubis
Application snapshots
User guide of the proletteryou will find here.