Did you write a blog post, magazine article or do a podcast about or mentioning OWASP Amass? Add it to this file and open a PR! The same goes for conference or meetup talks, workshops or trainings you did where this project was mentioned or used!
- Paul's Security Weekly:
- Enterprise Security Weekly #219: Attack Surface Management, Monitoring, & Mapping - Jeff Foley
- Episode 564: Technical Segment - Bug Bounty Hunting
- Hacking Simplified:
- Josh Amishav-Zlatin's Channel:
- Musab Khan's Channel:
- Nahamsec's Streams:
- The Hackers Arsenal:
- Jason Haddix's Recon Streams:
- Ghostlulz's YouTube Channel:
- ToolWar's YouTube Channel:
- Cyber Security & Information Systems - Information Analysis Center:
- Hackdoor India's YouTube Channel:
- Blog post on SecurityTrail's Blog:
- What is DNS Intelligence?
- What is OWASP? Top 10 Web Application Security Risks
- OWASP Amass: A Solid Information Gathering Tool
- Top Linux Distros for Ethical Hacking and Penetration Testing
- 5 Subdomain Takeover #ProTips
- Where You’ll Find Us: An Overview of SecurityTrails Integrations
- Top 7 Subdomain Scanner Tools: Find Subdomains in Seconds
- Blog post on WhoisXML API's Blog:
- Blog post on Intigriti's Blog:
- Article on ThreadFix:
- Blog post on Luke Stephens' (@hakluke):
- Blog post on WW Tech Blog:
- Blog post on HackerOne's Blog:
- Blog post on Synk's Blog:
- Blog post on Syed Abuthahir's Blog:
- Blog post on ncpd's Blog:
- Blog post on Gökhan Güzelkokar's Blog:
- Blog post on xploitprotocol's Blog:
- Blog post on TrustedSec's Blog:
- Forum post on SANS Internet Storm Center InfoSec Forums:
- Tutorial on Dionach's Blog:
- How to Use OWASP Amass: An Extensive Tutorial by Nick Gkogkos
- Blog post on epi052's Blog:
- Blog post on Aditya Soni's Blog:
- Blog post on Anshuman Pattnaik's Blog:
- Blog post on Hahwul's Blog:
- Blog post on Felipe Caon's Blog:
- Article on Hacker Toolbelt:
- Blog post on Capt. Meelo's Blog:
- Blog post on FireEye's Threat Research Blog:
- Article on Dark Reading Application Security:
- Tutorial on Daniel Miessler's Tutorials:
- Blog post on Agent_Maximus' Blog:
- Blog posts on Patrik Hudak's Blog:
- Blog post on vishnuraj's Blog:
- Blog post on Tutorgeeks' Blog:
- Blog post on Habr's Digital Security Blog:
- Blog post on Digital Shadow's Blog:
- Blog post on Noobhax's Blog:
- Article on Week in OSINT:
- Blog post on Alex Flor's Blog:
- Article on 0x00SEC:
- Article on Yeah Hub:
- Blog post on Jonathan Bouman's Blog:
- Blog post on Drafting my Thoughts:
- Blog post on Shankar R's Blog:
- Blog post on bit3code's Blog:
- Blog post on Appsecco's Blog:
- Blog post on Frans Hendrik Botes' Blog:
- Article on Pentester Land - Offensive InfoSec:
- Article on miloserdov.org:
- Blog post on Sahil Ahamad's Blog:
- Article on H1RD:
- Blog post on Enciphers Blog:
- Blog post on Sjoerd Langkemper's - Web application security:
- Blog post on Adam Toscher's Blog: Top Five Ways the Red Team breached the External Perimeter
- OWASP Amass Boot Camp Training by Jeff Foley, DEF CON 28 Red Team Village, 07.08.2020
- OWASP Portland Training Day:
- Blackhat Trainings:
- OWASP Amass Boot Camp by Jeff Foley, GrayHat 2020, 30.10.2020
- OWASP Amass Boot Camp by Jeff Foley, Cyber June'Gle Virtual Summit, 28.06.2020
- Lightning Talk at OWASP Sendai Day 2020 by Akitsugu Ito, on OWASP Amass, 08.02.2020
- Organizational Asset Discovery & Recon with OWASP Amass by Nick Gkogkos, BSides København 2020, 19.09.2020
- How to Use Amass Efficiently by Jeff Foley, NahamCom 2020, 14.06.2020
- The Bug Hunter's Methodology v4.0 - Recon Edition by Jason Haddix, NahamCom 2020, 14.06.2020 (Slides)
- Red Team Methodology - A Naked Look, by Jason Lang, DerbyCon 2019, 07.09.2019 YouTube Slides
- OWASP Amass by Jeff Foley and Anthony Rhodes, DEF CON 27 Demo Labs 09.08.2019
- Advanced Recon with OWASP Amass by Jeff Foley and Anthony Rhodes, DEF CON 27 Recon Village, 09.08.2019
- Asset Discovery Making Sense of the Ocean of OSINT by Richard Gold, DEF CON 27 Recon Village, 09.08.2019
- Let's get technical and hunt harder! by Bugcrowd Discussion Panel, DEF CON 27 Recon Village, 09.08.2019
- OWASP Amass - Discovering Internet Exposure by Jeff Foley and Anthony Rhodes, Bugcrowd LevelUp 0x04, 11.06.2019
- OWASP Amass Beyond Subdomain Enumeration by Jeff Foley and Anthony Rhodes, BSidesROC 2019, 23.03.2019
- Pose a Threat: How Perceptual Analysis Helps Bug Hunters by Rob Ragan and Oscar Salazar, AppSec California 2019, 24.01.2019 YouTube Slides
- Project Showcase: Amass by Jeff Foley, OWASP AppSec USA 2018, 12.10.2018
- The OWASP Amass Project: DNS Enumeration written in Go, by Jeff Foley, OWASP London Chapter, 29.09.2018
- The Bug Hunter's Methodology v3 by Jason Haddix, Bugcrowd LevelUp 0x02, 28.05.2018 (Slides)