Another Subdomain ENumeration Tool - written in python to enumerate and enrich subdomains using passive OSINT.
As3nt can target TLDs or subdomains. The enumeration uses; VirusTotal, HackerTarget, ThreatMiner, urlscan.io and crt.sh. Each subdomain IP is resolved using public DNS servers and the data is enriched using ipwhois and Shodan. As3nt currently outputs to terminal or csv.
Along with using the tags from Shodan, this tool also adds it's own tags. Currently there are tags added based on certain HTML content found by Shodan like tomcat, fortinet, netscaler and pulse vpn. Also if any CVEs are found for an IP/Subdomain with a CVSS score >= 7.8, these assets are tagged to highlight a possible exploit.
- Install:
- with pip:
pip install as3nt
- from git (source):
git clone https://github.com/cinerieus/as3nt.git && cd as3nt/
pip install -r requirements.txt
python ./as3nt/core.py
- from git (releases):
wget https://github.com/cinerieus/as3nt/archive/v1.1.0.tar.gz
pip install v1.1.0.tar.gz
- Remember to check PATH if you installed in ~/.local/bin/
- Profit!
*For Shodan functionality set the environment variable 'SHODANKEY' with your API key.
See requirements.txt
See CHANGELOG.md
*If selected Shodan is rate-limited to 1 IP per second.
- Run all modules against 'example.com' and save results to csv:
as3nt -t example.com -11 -o results.csv
- Run against a subdomain:
as3nt -s -t subdomain.example.com -11 -o results.csv