OWASP Amass
Attack surface intelligence framework performing network mapping and external asset discovery using OSINT gathering and active reconnaissance across 50+ data sources.
Developer
OWASP Foundation
description Technical Dossier
OWASP Amass is an attack surface intelligence framework designed to give security professionals an adversary’s-eye view of an organisation’s external footprint. At its core, it performs DNS enumeration and network mapping by querying a wide array of passive data sources — certificate transparency logs, search engines, passive DNS databases, threat intelligence platforms, and code repositories — then validates and expands findings through active techniques such as DNS brute-forcing, zone transfer attempts, NSEC zone walking, TLS certificate scraping, and web crawling. The result is a detailed graph of assets: subdomains, IP addresses, ASNs, WHOIS records, and the relationships linking them.
What sets Amass apart from simpler subdomain enumeration tools is the Open Asset Model (OAM). OAM is a formal data schema that represents both digital (hostnames, URLs, certificates) and physical (IP blocks, ASNs, organisations) assets along with typed relationship edges. All findings are persisted in a PostgreSQL asset database, enabling historical diffs, long-term infrastructure tracking, and querying over time — capabilities that elevate Amass from a one-shot recon script to a continuous attack surface management platform. The framework also supports Docker Compose orchestration for multi-container enterprise deployments.
As an OWASP Flagship Project with 14,000+ GitHub stars, Amass is integrated into numerous professional workflows: Maltego graph visualisation, Kali Linux inclusion, and widespread use in bug bounty reconnaissance pipelines. With over 50 supported data sources and active development, it is one of the most capable open-source external reconnaissance tools available, suitable for everything from solo penetration testers to enterprise red teams needing continuous asset inventory.
travel_explore Multi-Mode Enumeration
Supports passive (OSINT-only), normal (OSINT + DNS validation), and active (TLS cert grabs, zone transfers, NSEC walking, web crawling) reconnaissance modes.
hub 50+ Data Source Integration
Integrates Shodan, Censys, VirusTotal, SecurityTrails, BinaryEdge, FOFA, ZoomEye, certificate transparency logs, and dozens more via a single config file.
account_tree Open Asset Model
Structured data schema representing domains, IPs, ASNs, certificates, and their relationships in a PostgreSQL backend for persistent attack surface tracking.
diversity_3 Enterprise Orchestration
Docker Compose orchestration for multi-container deployments with Maltego transform support for graph-based asset relationship visualisation.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

Data Sources
50+
Language
GO
Backend
POSTGRESQL
License
APACHE 2.0