Skip to main content

Another Subdomain ENumeration Tool

Project description

Version 1.0.7 Python 3.8 GPL License


Another Subdomain ENumeration Tool - written in python to enumerate and enrich subdomains using passive OSINT.

As3nt can target TLDs or subdomains. The enumeration uses; VirusTotal, HackerTarget, ThreatCrowd, ThreatMiner, BufferOver, and Each subdomain IP is resolved using public DNS servers and the data is enriched using ipwhois and Shodan. As3nt currently outputs to terminal or csv.

Along with using the tags from Shodan, this tool also adds it's own tags. Currently there are tags added based on certain HTML content found by Shodan like tomcat, fortinet, netscaler and pulse vpn. Also if any CVEs are found for an IP/Subdomain with a CVSS score >= 7.8, these assets are tagged to highlight a possible exploit.




  1. Install:
  • with pip: pip install as3nt
  • from git (source):
    • git clone && cd as3nt/
    • pip install -r requirements.txt
    • python ./as3nt/
  • from git (releases):
    • wget
    • pip install v1.0.7.tar.gz
  1. Remember to check PATH if you installed in ~/.local/bin/
  2. Profit!

*For Shodan functionality set the environment variable 'SHODANKEY' with your API key.


See requirements.txt




*If selected Shodan is rate-limited to 1 IP per second.


  • Run all modules against '' and save results to csv:
    as3nt -t -11 -o results.csv
  • Run against a subdomain:
    as3nt -s -t -11 -o results.csv


Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

as3nt-1.0.7.tar.gz (8.7 kB view hashes)

Uploaded Source

Built Distribution

as3nt-1.0.7-py3-none-any.whl (15.3 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page