The ultimate pentesting toolkit.
Integrate with the leading commercial and open source security scanners to check for the latest CVEs and vulnerabilities in your environment.
Automate the most powerful tools.
Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.
Find what you can’t see.
Hacking is a problem that’s only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.Discover and prioritize risks in your organization.
Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.Quick Installation
Get up and running with our platform in minutes with our quick and easy one-line installation script.
Notifications & Changes
Receive notifications for changes in your environment, such as: new domains, new URLs, port changes and more.
Full Attack Surface Coverage
Discover both internal (on-prem) and external (cloud/hybrid) attack vectors for full asset visibility and vulnerability coverage.
Vulnerability Scanning
Scan for the latest CVE's and vulnerabilities using the latest open source and commercial vulnerability scanners.
Attack Surface Reports
Export your entire attack surface inventory (ie. sub-domains, DNS, open ports, HTTP headers, risk score, etc.) to CSV, XLS or PDF format.
Vulnerability Reports
Export vulnerability reports in CSV, XLS or PDF format for your entire attack surface.
Continuous Scan Coverage
Schedule scans on a daily, weekly or monthly basis to identify changes in your attack surface and remediate new vulnerabilities as they appear.
IT Asset Inventory
Build a centralized repository of your company's assets that can be easily searched, sorted and filtered to provide full visibility into your attack surface.
Integrations
Aggregate data from the leading security tools, API's and 3rd party services into our centralized reporting interface.
Modules
Create customized workflows and enhance testing capabilities with our integrated add-on modules.
DEMO VIDEO:
SN1PER COMMUNITY FEATURES:
- Automatically collects basic recon (ie. whois, ping, DNS, etc.)
- Automatically launches Google hacking queries against a target domain
- Automatically enumerates open ports via NMap port scanning
- Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers
- Automatically checks for sub-domain hijacking
- Automatically runs targeted NMap scripts against open ports
- Automatically runs targeted Metasploit scan and exploit modules
- Automatically scans all web applications for common vulnerabilities
- Automatically brute forces ALL open services
- Automatically test for anonymous FTP access
- Automatically runs WPScan, Arachni and Nikto for all web services
- Automatically enumerates NFS shares
- Automatically test for anonymous LDAP access
- Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities
- Automatically enumerate SNMP community strings, services and users
- Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067
- Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers
- Automatically tests for open X11 servers
- Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds
- Performs high level enumeration of multiple hosts and subnets
- Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting
- Automatically gathers screenshots of all web sites
- Create individual workspaces to store all scan output
AUTO-PWN:
- Apache Struts CVE-2018-11776 RCE exploit
- Android Insecure ADB RCE auto exploit
- Apache Tomcat CVE-2017-12617 RCE exploit
- Oracle WebLogic WLS-WSAT Component Deserialisation RCE CVE-2017-10271 exploit
- Drupal Drupalgedon2 RCE CVE-2018-7600
- GPON Router RCE CVE-2018-10561
- Apache Struts 2 RCE CVE-2017-5638
- Apache Struts 2 RCE CVE-2017-9805
- Apache Jakarta RCE CVE-2017-5638
- Shellshock GNU Bash RCE CVE-2014-6271
- HeartBleed OpenSSL Detection CVE-2014-0160
- Default Apache Tomcat Creds CVE-2009-3843
- MS Windows SMB RCE MS08-067
- Webmin File Disclosure CVE-2006-3392
- Anonymous FTP Access
- PHPMyAdmin Backdoor RCE
- PHPMyAdmin Auth Bypass
- JBoss Java De-Serialization RCE's
KALI LINUX INSTALL:
./install.sh
USAGE:
[*] NORMAL MODE
sniper -t|--target <TARGET>
[*] NORMAL MODE + OSINT + RECON + FULL PORT SCAN + BRUTE FORCE
sniper -t|--target <TARGET> -o|--osint -re|--recon -fp|--fullportonly -b|--bruteforce
[*] STEALTH MODE + OSINT + RECON
sniper -t|--target <TARGET> -m|--mode stealth -o|--osint -re|--recon
[*] DISCOVER MODE
sniper -t|--target <CIDR> -m|--mode discover -w|--workspace <WORSPACE_ALIAS>
[*] FLYOVER MODE
sniper -t|--target <TARGET> -m|--mode flyover -w|--workspace <WORKSPACE_ALIAS>
[*] AIRSTRIKE MODE
sniper -f|--file /full/path/to/targets.txt -m|--mode airstrike
[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f--file /full/path/to/targets.txt -m|--mode nuke -w|--workspace <WORKSPACE_ALIAS>
[*] SCAN ONLY SPECIFIC PORT
sniper -t|--target <TARGET> -m port -p|--port <portnum>
[*] FULLPORTONLY SCAN MODE
sniper -t|--target <TARGET> -fp|--fullportonly
[*] PORT SCAN MODE
sniper -t|--target <TARGET> -m|--mode port -p|--port <PORT_NUM>
[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t|--target <TARGET> -m|--mode web
[*] HTTP WEB PORT HTTP MODE
sniper -t|--target <TARGET> -m|--mode webporthttp -p|--port <port>
[*] HTTPS WEB PORT HTTPS MODE
sniper -t|--target <TARGET> -m|--mode webporthttps -p|--port <port>
[*] ENABLE BRUTEFORCE
sniper -t|--target <TARGET> -b|--bruteforce
[*] ENABLE LOOT IMPORTING INTO METASPLOIT
sniper -t|--target <TARGET>
[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport
[*] SCAN STATUS
sniper --status
[*] UPDATE SNIPER
sniper -u|--update
MODES:
- NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.
- STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.
- FLYOVER: Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).
- AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.
- NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.
- DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
- PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.
- FULLPORTONLY: Performs a full detailed port scan and saves results to XML.
- WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
- WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.
- WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.
New Integrations
We are pleased to announce that we have added the following major integrations and updates to Sn1per Professional v10.0:- OpenVAS/GVM 21.x integration & sc0pe parser
- Nessus 10.x integration & sc0pe parser
- OWASP ZAP 2.11.x integration & sc0pe parser
Sn1per Modules
Create customized workflows and enhance testing capabilities with our integrated add-on modules.Command Execution Module
Easily manage Sn1per Professional instances from the web interface without ever touching the command line.
Find out more.
MassPwn Module
Pop shells and import vulnerability scan data from Metasploit.
Find out more.
Nessus Module
Scan for the latest vulnerabilities using Nessus and download detailed vulnerability reports.
Find out more.
Fuzzer Module
Fuzz for OWASP TOP 10 vulnerabilities and discover hidden content easily.
Find out more.
Brute Force Module
Check for default and weak credentials across all hosts in your workspace instantly.
Find out more.
Port Scanner Module
Leverage the full power of NMap with our integrated GUI front-end.
Find out more.
Threat Intel Module
Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases.
Find out more.
ReverseAPK Module
Reverse engineer Android applications in seconds to uncover hidden secrets and vulnerabilities.
Find out more.