OWASP Amass

Attack surface intelligence framework performing network mapping and external asset discovery using OSINT gathering and active reconnaissance across 50+ data sources.

Developer

OWASP Foundation

verified_user
Visit Official Site open_in_new

description Technical Dossier

OWASP Amass is an attack surface intelligence framework designed to give security professionals an adversary’s-eye view of an organisation’s external footprint. At its core, it performs DNS enumeration and network mapping by querying a wide array of passive data sources — certificate transparency logs, search engines, passive DNS databases, threat intelligence platforms, and code repositories — then validates and expands findings through active techniques such as DNS brute-forcing, zone transfer attempts, NSEC zone walking, TLS certificate scraping, and web crawling. The result is a detailed graph of assets: subdomains, IP addresses, ASNs, WHOIS records, and the relationships linking them.

What sets Amass apart from simpler subdomain enumeration tools is the Open Asset Model (OAM). OAM is a formal data schema that represents both digital (hostnames, URLs, certificates) and physical (IP blocks, ASNs, organisations) assets along with typed relationship edges. All findings are persisted in a PostgreSQL asset database, enabling historical diffs, long-term infrastructure tracking, and querying over time — capabilities that elevate Amass from a one-shot recon script to a continuous attack surface management platform. The framework also supports Docker Compose orchestration for multi-container enterprise deployments.

As an OWASP Flagship Project with 14,000+ GitHub stars, Amass is integrated into numerous professional workflows: Maltego graph visualisation, Kali Linux inclusion, and widespread use in bug bounty reconnaissance pipelines. With over 50 supported data sources and active development, it is one of the most capable open-source external reconnaissance tools available, suitable for everything from solo penetration testers to enterprise red teams needing continuous asset inventory.

travel_explore Multi-Mode Enumeration

Supports passive (OSINT-only), normal (OSINT + DNS validation), and active (TLS cert grabs, zone transfers, NSEC walking, web crawling) reconnaissance modes.

hub 50+ Data Source Integration

Integrates Shodan, Censys, VirusTotal, SecurityTrails, BinaryEdge, FOFA, ZoomEye, certificate transparency logs, and dozens more via a single config file.

account_tree Open Asset Model

Structured data schema representing domains, IPs, ASNs, certificates, and their relationships in a PostgreSQL backend for persistent attack surface tracking.

diversity_3 Enterprise Orchestration

Docker Compose orchestration for multi-container deployments with Maltego transform support for graph-based asset relationship visualisation.

Distribution Model

Open Source

Free community edition available.
Enterprise support on request.

trending_up Popularity

Low 75 / 100 High

settings_suggest Deployment Complexity

Low 55 / 100 High

engineering Technical Difficulty

Low 60 / 100 High
OWASP Amass visualization
radar

Data Sources

50+

Language

GO

Backend

POSTGRESQL

License

APACHE 2.0