{"id":13411886,"url":"https://github.com/jonluca/Anubis","last_synced_at":"2025-03-14T17:31:16.155Z","repository":{"id":41055535,"uuid":"113704915","full_name":"jonluca/Anubis","owner":"jonluca","description":"Subdomain enumeration and information gathering tool","archived":false,"fork":false,"pushed_at":"2024-10-21T20:03:15.000Z","size":280,"stargazers_count":1198,"open_issues_count":8,"forks_count":154,"subscribers_count":27,"default_branch":"master","last_synced_at":"2024-10-29T15:07:11.712Z","etag":null,"topics":["anubis","anubis-db","dnsdumpster","hackertarget","information-gathering","information-security","kali","netcraft","network","network-security","subdomain","subdomains"],"latest_commit_sha":null,"homepage":"https://jonlu.ca/anubis/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jonluca.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2017-12-09T22:12:41.000Z","updated_at":"2024-10-28T05:31:49.000Z","dependencies_parsed_at":"2023-10-15T05:14:17.666Z","dependency_job_id":"66e3e20c-798f-4418-8307-bbe6f7bec69f","html_url":"https://github.com/jonluca/Anubis","commit_stats":{"total_commits":260,"total_committers":11,"mean_commits":"23.636363636363637","dds":"0.16923076923076918","last_synced_commit":"9ea89fa50d6a203746f03c1e6452e348367f0af3"},"previous_names":[],"tags_count":28,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jonluca%2FAnubis","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jonluca%2FAnubis/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jonluca%2FAnubis/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jonluca%2FAnubis/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jonluca","download_url":"https://codeload.github.com/jonluca/Anubis/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243618687,"owners_count":20320275,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["anubis","anubis-db","dnsdumpster","hackertarget","information-gathering","information-security","kali","netcraft","network","network-security","subdomain","subdomains"],"created_at":"2024-07-30T20:01:18.031Z","updated_at":"2025-03-14T17:31:16.149Z","avatar_url":"https://github.com/jonluca.png","language":"Python","readme":"# Anubis\n\n[![Build Status](https://travis-ci.org/jonluca/Anubis.svg?branch=master)](https://travis-ci.org/jonluca/Anubis) ![Coverage](https://github.com/jonluca/Anubis/blob/master/coverage.svg) [![GitHub issues](https://img.shields.io/github/issues/jonluca/Anubis.svg)](https://github.com/jonluca/Anubis/issues) [![GitHub license](https://img.shields.io/github/license/jonluca/Anubis.svg)](https://github.com/jonluca/Anubis/blob/master/LICENSE)\n\n```\n        d8888                   888      d8b\n       d88888                   888      Y8P\n      d88P888                   888\n     d88P 888 88888b.  888  888 88888b.  888 .d8888b\n    d88P  888 888 \"88b 888  888 888 \"88b 888 88K\n   d88P   888 888  888 888  888 888  888 888 \"Y8888b.\n  d8888888888 888  888 Y88b 888 888 d88P 888      X88\n d88P     888 888  888  \"Y88888 88888P\"  888  88888P'\n```\n\nAnubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources,\nincluding HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, Shodan, Spyse, and NetCraft.\nAnubis also has a sister project, [AnubisDB](https://github.com/jonluca/Anubis-DB), which serves as a centralized\nrepository of subdomains.\n\n[Original Medium article release](https://medium.com/@jonluca/introducing-anubis-a-new-subdomain-enumerator-and-information-gathering-tool-d25b39ad98f2)\n\n## Getting Started\n\n### Prerequisites\n\n* Nmap (if wanting to run port scans and certain certificate scans)\n\nIf you are running Linux, the following are also required:\n\n`sudo apt-get install python3-pip python-dev libssl-dev libffi-dev`\n\n### Installing\n\nNote: Python 3 is required\n\n`pip3 install anubis-netsec`\n\n### Install From Source\n\nPlease note Anubis is still in beta.\n\n```\ngit clone https://github.com/jonluca/Anubis.git\ncd Anubis\npip3 install  -r requirements.txt\npip3 install .\n```\n\n## Usage\n\n    Usage:\n      anubis (-t TARGET | -f FILE) [-o FILENAME]  [-bdinoprsSv] [-w SCAN] [-q NUM]\n      anubis -h\n      anubis (--version | -V)\n      \n    Options:\n      -h --help                       show this help message and exit\n      -t --target                     set target (comma separated, no spaces, if multiple)\n      -f --file                       set target (reads from file, one domain per line)\n      -n --with-nmap                  perform an nmap service/script scan\n      -o --output                     save to filename\n      -i --additional-info            show additional information about the host from Shodan (requires API key)\n      -p --ip                         outputs the resolved IPs for each subdomain, and a full list of unique ips\n      -d --send-to-anubis-db          send results to Anubis-DB\n      -r --recursive                  recursively search over all subdomains\n      -s --ssl                        run an ssl scan and output cipher + chain info\n      -S --silent                     only out put subdomains, one per line\n      -w --overwrite-nmap-scan SCAN   overwrite default nmap scan (default -nPn -sV -sC)\n      -v --verbose                    print debug info and full request output\n      -q --queue-workers NUM          override number of queue workers (default: 10, max: 100)\n      -V --version                       show version and exit\n    \n    Help:\n      For help using this tool, please open an issue on the Github repository:\n      https://github.com/jonluca/anubis\n\nNote: If you'd like to use the shodan.io API, make sure to prefix the command with `SHODAN_API_KEY=yourkey`\n\n### Basic\n\n#### Common Use Case\n\n`anubis -tip  domain.com -o out.txt`\n\nSet's target to `domain.com`, (`t`) outputs additional information (`i`) like server and ISP or server hosting provider,\nthen attempts to resolve all URLs (`p`) and outputs list of unique IPs and sends to Anubis-DB (`a`). Finally, writes all\nresults to out.txt (`o`).\n\n#### Other\n\n```anubis -t reddit.com``` Simplest use of Anubis, just runs subdomain enumeration\n\n```\nSearching for subdomains for 151.101.65.140 (reddit.com)\n\nTesting for zone transfers\nSearching for Subject Alt Names\nSearching HackerTarget\nSearching VirusTotal\nSearching Pkey.in\nSearching NetCraft.com\nSearching crt.sh\nSearching DNSDumpster\nSearching Anubis-DB\nFound 193 subdomains\n----------------\nfj.reddit.com\nse.reddit.com\ngateway.reddit.com\nbeta.reddit.com\nww.reddit.com\n... (truncated for readability)\nSending to AnubisDB\nSubdomain search took 0:00:20.390\n```\n\n`anubis -t reddit.com -ip` (equivalent to `anubis -t reddit.com --additional-info --ip`) - resolves IPs and outputs list\nof uniques, and provides additional information through https://shodan.io\n\n```\nSearching for subdomains for 151.101.65.140\nServer Location: San Francisco US - 94107\nISP: Fastly\nFound 27 domains\n----------------\nhttp://www.np.reddit.com: 151.101.193.140\nhttp://nm.reddit.com: 151.101.193.140\nhttp://ww.reddit.com: 151.101.193.140\nhttp://dg.reddit.com: 151.101.193.140\nhttp://en.reddit.com: 151.101.193.140\nhttp://ads.reddit.com: 151.101.193.140\nhttp://zz.reddit.com: 151.101.193.140\nout.reddit.com: 107.23.11.190\norigin.reddit.com: 54.172.97.226\nhttp://blog.reddit.com: 151.101.193.140\nalb.reddit.com: 52.201.172.48\nhttp://m.reddit.com: 151.101.193.140\nhttp://rr.reddit.com: 151.101.193.140\nreddit.com: 151.101.65.140\nhttp://www.reddit.com: 151.101.193.140\nmx03.reddit.com: 151.101.193.140\nhttp://fr.reddit.com: 151.101.193.140\nrhs.reddit.com: 54.172.97.229\nhttp://np.reddit.com: 151.101.193.140\nhttp://nj.reddit.com: 151.101.193.140\nhttp://re.reddit.com: 151.101.193.140\nhttp://iy.reddit.com: 151.101.193.140\nmx02.reddit.com: 151.101.193.140\nmailp236.reddit.com: 151.101.193.140\nFound 6 unique IPs\n52.201.172.48\n151.101.193.140\n107.23.11.190\n151.101.65.140\n54.172.97.226\n54.172.97.229\nExecution took 0:00:04.604\n```\n\n### Advanced\n\n```anubis -t reddit.com --with-nmap -o temp.txt -i --overwrite-nmap-scan \"-F -T5\"```\n\n```\nSearching for subdomains for 151.101.65.140 (reddit.com)\n\nTesting for zone transfers\nSearching for Subject Alt Names\nSearching HackerTarget\nSearching VirusTotal\nSearching Pkey.in\nSearching NetCraft.com\nSearching crt.sh\nSearching DNSDumpster\nSearching Anubis-DB\nSearching Shodan.io for additional information\nServer Location: San Francisco, US - 94107\nISP  or Hosting Company: Fastly\nTo run a DNSSEC subdomain enumeration, Anubis must be run as root\nStarting Nmap Scan\nHost : 151.101.65.140 ()\n----------\nProtocol: tcp\nport: 80\tstate: open\nport: 443\tstate: open\nFound 195 subdomains\n----------------\nnm.reddit.com\nne.reddit.com\nsonics.reddit.com\naj.reddit.com\nfo.reddit.com\nf5.reddit.com\n... (truncated for readability)\nSending to AnubisDB\nSubdomain search took 0:00:26.579\n```\n\n## Running the tests\n\nRun tests on their own, in native pytest environment\n\n```pytest```\n\n## Built With\n\n* CLI Boilerplate by [Skele-CLI](https://github.com/rdegges/skele-cli)\n\n## Contributing\n\nPlease read [CONTRIBUTING.md](https://github.com/jonluca/Anubis/blob/master/CONTRIBUTING.md) for details on our code of\nconduct, and the process for submitting pull requests to us.\n\n## Authors\n\n* **JonLuca DeCaro** - *Initial work* - [Anubis](https://github.com/Anubis)\n\nSee also the list of [contributors](https://github.com/jonluca/Anubis/contributors) who participated in this project.\n\n## License\n\nThis project is licensed under the MIT License - see the [LICENSE.md](LICENSE.md) file for details\n\n## Acknowledgments\n\n* [/r/netsec](https://reddit.com/r/netsec)\n\n* [BitQuark for the most common subdomains](https://github.com/bitquark/dnspop/tree/master/results)\n\n","funding_links":[],"categories":["Python","[](#table-of-contents) Table of contents","Python (1887)","Synopsis"],"sub_categories":["[](#subdomains-scanbrute)Subdomains scan/brute","Table of Contents"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjonluca%2FAnubis","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjonluca%2FAnubis","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjonluca%2FAnubis/lists"}