45 lines
1.3 KiB
Nix
45 lines
1.3 KiB
Nix
{ buildGoModule
|
|
, fetchFromGitHub
|
|
, lib
|
|
}:
|
|
|
|
buildGoModule rec {
|
|
pname = "amass";
|
|
version = "3.7.3";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "OWASP";
|
|
repo = "Amass";
|
|
rev = "v${version}";
|
|
sha256 = "083c59yig9z0ksvcm9dvy0mv13k79rgnvqrr5qhbhzjz3bgzy1dq";
|
|
};
|
|
|
|
vendorSha256 = "1s8g0qqg3m6hdvc5v3s86l3ba5grmyhx0lf2ymi39k5dpcg8l19s";
|
|
|
|
outputs = [ "out" "wordlists" ];
|
|
|
|
postInstall = ''
|
|
mkdir -p $wordlists
|
|
cp -R $src/examples/wordlists/*.txt $wordlists
|
|
gzip $wordlists/*.txt
|
|
'';
|
|
|
|
meta = with lib; {
|
|
description = "In-Depth DNS Enumeration and Network Mapping";
|
|
longDescription = ''
|
|
The OWASP Amass tool suite obtains subdomain names by scraping data
|
|
sources, recursive brute forcing, crawling web archives,
|
|
permuting/altering names and reverse DNS sweeping. Additionally, Amass
|
|
uses the IP addresses obtained during resolution to discover associated
|
|
netblocks and ASNs. All the information is then used to build maps of the
|
|
target networks.
|
|
|
|
Amass ships with a set of wordlist (to be used with the amass -w flag)
|
|
that are found under the wordlists output.
|
|
'';
|
|
homepage = "https://www.owasp.org/index.php/OWASP_Amass_Project";
|
|
license = licenses.asl20;
|
|
maintainers = with maintainers; [ kalbasit ];
|
|
};
|
|
}
|