45 lines
1.3 KiB
Nix
45 lines
1.3 KiB
Nix
{ buildGoModule
|
|
, fetchFromGitHub
|
|
, lib
|
|
}:
|
|
|
|
buildGoModule rec {
|
|
pname = "amass";
|
|
version = "3.4.2";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "OWASP";
|
|
repo = "Amass";
|
|
rev = "v${version}";
|
|
sha256 = "0mia01cqmaa17696m73qazpbyrcng7wldca79g46xgc4z96q1i7i";
|
|
};
|
|
|
|
modSha256 = "1zwm7skdhql6isffyhixqsgvcgxw2436iv8bj92cxs70ipk537v9";
|
|
|
|
outputs = [ "out" "wordlists" ];
|
|
|
|
postInstall = ''
|
|
mkdir -p $wordlists
|
|
cp -R $src/examples/wordlists/*.txt $wordlists
|
|
gzip $wordlists/*.txt
|
|
'';
|
|
|
|
meta = with lib; {
|
|
description = "In-Depth DNS Enumeration and Network Mapping";
|
|
longDescription = ''
|
|
The OWASP Amass tool suite obtains subdomain names by scraping data
|
|
sources, recursive brute forcing, crawling web archives,
|
|
permuting/altering names and reverse DNS sweeping. Additionally, Amass
|
|
uses the IP addresses obtained during resolution to discover associated
|
|
netblocks and ASNs. All the information is then used to build maps of the
|
|
target networks.
|
|
|
|
Amass ships with a set of wordlist (to be used with the amass -w flag)
|
|
that are found under the wordlists output.
|
|
'';
|
|
homepage = "https://www.owasp.org/index.php/OWASP_Amass_Project";
|
|
license = licenses.asl20;
|
|
maintainers = with maintainers; [ kalbasit ];
|
|
};
|
|
}
|