Anubis is a tool collectionss subdomain. It concentrates data from various sources including HackerTarget, DNSDumpster, VirusTotal, Google, Pkey and NetCraft.
Anubis has one more program that helps it discover them subdomains, the AnubisDB.
Specifications
- Gathers data from a variety of sources to provide one of the most comprehensive tools for finding subdomains.
- It is able to identify all the key servers behind the domains and export any IP addresses.
- It is also able to export information by less-used, but potentially efficient "roads", including DNSSEC subdomain lists and zone transfers.
Installation
sudo apt-get install python3-pip python-dev libssl-dev libffi-dev
pip3 install anubis-netsec
ή
git clone https://github.com/jonluca/Anubis.git cd Anubis pip3 install -r requirements.txt pip3 install
Use
Usage: anubis -t TARGET [-o FILENAME] [-noispbarv] [-w SCAN] [-q NUM] anubis -h anubis --version Options: -h --help show this help message and exit -t --target set target (comma separated, no spaces, if multiple) -n --with-nmap perform an nmap service / script scan -o --output save to filename -i --additional-info show additional information about the host from Shodan ( requires API key) -p --ip outputs the resolved IPs for each subdomain, and a full list of unique ips -a --send-to-anubis-db send results to Anubis-DB -r --recursive recursively search over all subdomains -s --ssl run an ssl scan and output cipher + chain info -w --overwrite-nmap-scan SCAN overwrite default nmap scan (default -nPn -sV -sC) -v --verbose print debug info and full request output -q --queue-workers NUM override number of queue workers (default: 10, max: 100) --version show version and exit Help: For help using this tool, please open an issue on the Github repository: https: / /github.com/jonluca/anubis
Snapshots applicationς
You will find a user guide for the program here.