Menu

Tree [9deac2] master /
 History

HTTPS access


File Date Author Commit
 bin 2021-09-27 xer0dayz xer0dayz [c0c21a] Sn1per by @Sn1perSecurity - https://sn1persecur...
 conf 2021-09-27 xer0dayz xer0dayz [c0c21a] Sn1per by @Sn1perSecurity - https://sn1persecur...
 loot 2016-08-29 1N3 1N3 [3641a0] Delete nmap-10.0.0.1.xml
 modes 2022-12-11 root root [c50af9] Sn1per by @Sn1perSecurity - https://sn1persecur...
 pro 2021-10-03 xer0dayz xer0dayz [95204f] Sn1per by @Sn1perSecurity - https://sn1persecur...
 templates 2022-12-11 root root [c50af9] Sn1per by @Sn1perSecurity - https://sn1persecur...
 wordlists 2021-09-27 xer0dayz xer0dayz [c0c21a] Sn1per by @Sn1perSecurity - https://sn1persecur...
 CHANGELOG.md 2022-12-12 xer0dayz xer0dayz [56e54e] Sn1per by @sn1persecurity - https://sn1persecur...
 Dockerfile 2023-03-05 nnesetto nnesetto [2854c4] Change commands in Dockerfile and add workdir
 Dockerfile.blackarch 2023-03-05 nnesetto nnesetto [5ba592] Add Dockerfile based on BlackArch
 LICENSE.md 2022-06-14 root root [db5348] Sn1per by @sn1persecurity - https://sn1persecur...
 README.md 2023-01-02 xer0dayz xer0dayz [88dc7f] Sn1per by @sn1persecurity - https://sn1persecur...
 docker-compose.yml 2023-03-05 nnesetto nnesetto [11dc28] Add file
 install.sh 2023-03-05 nnesetto nnesetto [34fc14] Change old apt-get to apt
 sn1per.desktop 2021-10-03 xer0dayz xer0dayz [95204f] Sn1per by @Sn1perSecurity - https://sn1persecur...
 sn1per.png 2021-10-03 xer0dayz xer0dayz [808160] Sn1per by @Sn1perSecurity - https://sn1persecur...
 sniper 2022-12-12 root root [873077] Sn1per by @Sn1perSecurity - https://sn1persecur...
 sniper.conf 2021-09-27 xer0dayz xer0dayz [c0c21a] Sn1per by @Sn1perSecurity - https://sn1persecur...
 uninstall.sh 2021-09-27 xer0dayz xer0dayz [c0c21a] Sn1per by @Sn1perSecurity - https://sn1persecur...

Read Me

Sn1perSecurity

GitHub release
GitHub issues
Github Stars
GitHub Followers
Tweet
Follow on Twitter

[Website] [Blog] [Shop] [Documentation] [Demo] [Find Out More]

Attack Surface Management

Discover hidden assets and vulnerabilities in your environment

[Find out more]

The ultimate pentesting toolkit.

Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.

Automate the most powerful tools.

Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.

Find what you can't see.

Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.

Discover and prioritize risks in your organization.

Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.

See Sn1per in action!

News

Kali/Ubuntu/Debian/Parrot Linux Install

git clone https://github.com/1N3/Sn1per
cd Sn1per
bash install.sh

AWS AMI (Free Tier) VPS Install

To install Sn1per using an AWS EC2 instance:

  1. Go to https://aws.amazon.com/marketplace/pp/prodview-rmloab6wnymno and click the “Continue to Subscribe” button
  2. Click the “Continue to Configuration” button
  3. Click the “Continue to Launch” button
  4. Login via SSH using the public IP of the new EC2 instance

Docker Install

From a new Docker console, run the following commands.

Download https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile
docker build -t sn1per . 
docker run -it sn1per /bin/bash

or 

docker pull xer0dayz/sn1per
docker run -it xer0dayz/sn1per /bin/bash

Usage

[*] NORMAL MODE
sniper -t <TARGET>

[*] NORMAL MODE + OSINT + RECON
sniper -t <TARGET> -o -re

[*] STEALTH MODE + OSINT + RECON
sniper -t <TARGET> -m stealth -o -re

[*] DISCOVER MODE
sniper -t <CIDR> -m discover -w <WORSPACE_ALIAS>

[*] SCAN ONLY SPECIFIC PORT
sniper -t <TARGET> -m port -p <portnum>

[*] FULLPORTONLY SCAN MODE
sniper -t <TARGET> -fp

[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t <TARGET> -m web

[*] HTTP WEB PORT MODE
sniper -t <TARGET> -m webporthttp -p <port>

[*] HTTPS WEB PORT MODE
sniper -t <TARGET> -m webporthttps -p <port>

[*] HTTP WEBSCAN MODE
sniper -t <TARGET> -m webscan 

[*] ENABLE BRUTEFORCE
sniper -t <TARGET> -b

[*] AIRSTRIKE MODE
sniper -f targets.txt -m airstrike

[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>

[*] MASS PORT SCAN MODE
sniper -f targets.txt -m massportscan

[*] MASS WEB SCAN MODE
sniper -f targets.txt -m massweb

[*] MASS WEBSCAN SCAN MODE
sniper -f targets.txt -m masswebscan

[*] MASS VULN SCAN MODE
sniper -f targets.txt -m massvulnscan

[*] PORT SCAN MODE
sniper -t <TARGET> -m port -p <PORT_NUM>

[*] LIST WORKSPACES
sniper --list

[*] DELETE WORKSPACE
sniper -w <WORKSPACE_ALIAS> -d

[*] DELETE HOST FROM WORKSPACE
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh

[*] GET SNIPER SCAN STATUS
sniper --status

[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport

[*] LOOT REIMPORTALL FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimportall

[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reload

[*] LOOT EXPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --export

[*] SCHEDULED SCANS
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly

[*] USE A CUSTOM CONFIG
sniper -c /path/to/sniper.conf -t <TARGET> -w <WORKSPACE_ALIAS>

[*] UPDATE SNIPER
sniper -u|--update

Modes

  • NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.
  • STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.
  • FLYOVER: Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).
  • AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.
  • NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.
  • DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
  • PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.
  • FULLPORTONLY: Performs a full detailed port scan and saves results to XML.
  • MASSPORTSCAN: Runs a "fullportonly" scan on mutiple targets specified via the "-f" switch.
  • WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
  • MASSWEB: Runs "web" mode scans on multiple targets specified via the "-f" switch.
  • WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.
  • WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.
  • WEBSCAN: Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni.
  • MASSWEBSCAN: Runs "webscan" mode scans of multiple targets specified via the "-f" switch.
  • VULNSCAN: Launches a OpenVAS vulnerability scan.
  • MASSVULNSCAN: Launches a "vulnscan" mode scans on multiple targets specified via the "-f" switch.

Help Topics

  • Plugins & Tools (https://github.com/1N3/Sn1per/wiki/Plugins-&-Tools)
  • Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)
  • Sn1per Configuration Options (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Options)
  • Sn1per Configuration Templates (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Templates)
  • Sc0pe Templates (https://github.com/1N3/Sn1per/wiki/Sc0pe-Templates)

Integration Guides

  • Github API integration (https://github.com/1N3/Sn1per/wiki/Github-API-Integration)
  • Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)
  • OWASP ZAP integration (https://github.com/1N3/Sn1per/wiki/OWASP-ZAP-Integration)
  • Shodan API integration (https://github.com/1N3/Sn1per/wiki/Shodan-Integration)
  • Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)
  • Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)
  • Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)
  • Nessus integration (https://github.com/1N3/Sn1per/wiki/Nessus-Integration)
  • OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)
  • GVM 21.x integration (https://github.com/1N3/Sn1per/wiki/GVM-21.x-Integration)
  • Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)
  • WPScan API integration (https://github.com/1N3/Sn1per/wiki/WPScan-API-Integration)

For license and legal information, refer to the LICENSE.md (https://github.com/1N3/Sn1per/blob/master/LICENSE.md) file in this repository.

Purchase Sn1per Professional

To obtain a Sn1per Professional license, go to https://sn1persecurity.com.

Attack Surface Management (ASM) | Continuous Attack Surface Testing (CAST) | Attack Surface Software | Attack Surface Platform | Continuous Automated Red Teaming (CART) | Vulnerability & Attack Surface Management | Red Team | Threat Intel | Application Security | Cybersecurity | IT Asset Discovery | Automated Penetration Testing | Hacking Tools | Recon Tool | Bug Bounty Tool | Vulnerability Scanner | Attack Surface Analysis | Attack Surface Reduction | Attack Surface Detector | Attack Surface Monitoring | Attack Surface Review | Attack Surface Discovery | Digital Threat Management | Risk Assessment | Threat Remediation | Offensive Security Framework | Automated Penetration Testing Framework | External Threat Management | Internal IT Asset Discovery | Security Orchestration and Automation (SOAR) | Sn1per tutorial | Sn1per tool | Sn1per metasploit | Sn1per for windows | Sn1per review | Sn1per download | how to use Sn1per | Sn1per professional download | Sn1per professional crack | automated pentesting framework | pentest-tools github | ad pentest tools | pentest-tools review | security testing tools | ubuntu pentesting tools | pentesting tools for mac | cloud-based pen-testing tools