{"id":763,"date":"2022-12-15T08:38:28","date_gmt":"2022-12-15T08:38:28","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=763"},"modified":"2022-12-15T08:38:28","modified_gmt":"2022-12-15T08:38:28","slug":"automated-pentesting-framework-sn1per","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=763","title":{"rendered":"Automated pentesting framework ( Sn1per)"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D763\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=763&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><div class=\"d-flex js-sticky js-position-sticky top-0 border-top-0 border-bottom p-2 flex-items-center flex-justify-between color-bg-default rounded-top-2 is-stuck\" data-original-top=\"0px\">\n<div class=\"d-flex flex-items-center\">\n<h2 class=\"Box-title\"><a class=\"Link--primary\" href=\"https:\/\/github.com\/1N3\/Sn1per#readme\" data-view-component=\"true\">README.md<\/a><\/h2>\n<\/div>\n<\/div>\n<div class=\"Box-body px-5 pb-5\" data-target=\"readme-toc.content\">\n<article class=\"markdown-body entry-content container-lg\">\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/8dfe150ca2ef303664fa421f8b43aff223768cd6c3aa101f3d6c7e9660d9c2b8\/68747470733a2f2f736e3170657273656375726974792e636f6d2f696d616765732f536e3170657253656375726974792d41747461636b2d537572666163652d4d616e6167656d656e742d686561646572322e706e67\" alt=\"Sn1perSecurity\" data-canonical-src=\"https:\/\/sn1persecurity.com\/images\/Sn1perSecurity-Attack-Surface-Management-header2.png\" \/><\/a><\/p>\n<p dir=\"auto\"><a href=\"https:\/\/github.com\/1N3\/Sn1per\/releases\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/204fd2e2a5648a68ef044efd86c4deacbf27b017d791d3be60a3ae2c1ea9af50\/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f72656c656173652f314e332f536e317065722e737667\" alt=\"GitHub release\" data-canonical-src=\"https:\/\/img.shields.io\/github\/release\/1N3\/Sn1per.svg\" \/><\/a>\u00a0<a href=\"https:\/\/github.com\/1N3\/Sn1per\/issues\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/be9e010a3ffb8555fdf6b64a28f01b74c308cb0d69f408d05aa228aaaf3334c8\/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f314e332f536e317065722e737667\" alt=\"GitHub issues\" data-canonical-src=\"https:\/\/img.shields.io\/github\/issues\/1N3\/Sn1per.svg\" \/><\/a>\u00a0<a href=\"https:\/\/github.com\/1N3\/Sn1per\/\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/681e4155e2a6d25ab61e1741c52b6a0f989c3e0c7af40eaec595889a22c9e0df\/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f314e332f536e317065722e7376673f7374796c653d736f6369616c266c6162656c3d5374617273\" alt=\"Github Stars\" data-canonical-src=\"https:\/\/img.shields.io\/github\/stars\/1N3\/Sn1per.svg?style=social&amp;label=Stars\" \/><\/a>\u00a0<a href=\"https:\/\/github.com\/1N3\/Sn1per\/\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/c4777cf7da146f159c4cb0d4b47bfbea7524eb04a8cde46f5108970655b078ac\/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f6c6c6f776572732f314e332e7376673f7374796c653d736f6369616c266c6162656c3d466f6c6c6f77\" alt=\"GitHub Followers\" data-canonical-src=\"https:\/\/img.shields.io\/github\/followers\/1N3.svg?style=social&amp;label=Follow\" \/><\/a>\u00a0<a href=\"https:\/\/twitter.com\/intent\/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview&amp;ref_src=twsrc%5Etfw&amp;text=Sn1per%20-%20Automated%20Pentest%20Recon%20Scanner&amp;tw_p=tweetbutton&amp;url=https%3A%2F%2Fgithub.com%2F1N3%2FSn1per\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/502ec3996ef7b37d6a78289b42662d326294e10217a14c07a9801e652858d793\/68747470733a2f2f696d672e736869656c64732e696f2f747769747465722f75726c2f687474702f786572306461797a2e7376673f7374796c653d736f6369616c\" alt=\"Tweet\" data-canonical-src=\"https:\/\/img.shields.io\/twitter\/url\/http\/xer0dayz.svg?style=social\" \/><\/a>\u00a0<a href=\"https:\/\/twitter.com\/intent\/follow?screen_name=xer0dayz\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/d88157f9d3bf4b6c8babc1559093238425354d4e32399a9b0fa38f314910f707\/68747470733a2f2f696d672e736869656c64732e696f2f747769747465722f666f6c6c6f772f786572306461797a2e7376673f7374796c653d736f6369616c266c6162656c3d466f6c6c6f77\" alt=\"Follow on Twitter\" data-canonical-src=\"https:\/\/img.shields.io\/twitter\/follow\/xer0dayz.svg?style=social&amp;label=Follow\" \/><\/a><\/p>\n<p dir=\"auto\">[<a href=\"https:\/\/sn1persecurity.com\/wordpress\/\" rel=\"nofollow\">Website<\/a>] [<a href=\"https:\/\/sn1persecurity.com\/wordpress\/blog\/\" rel=\"nofollow\">Blog<\/a>] [<a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\" rel=\"nofollow\">Shop<\/a>] [<a href=\"https:\/\/sn1persecurity.com\/wordpress\/documentation\/\" rel=\"nofollow\">Documentation<\/a>] [<a href=\"https:\/\/www.youtube.com\/c\/Sn1perSecurity\/videos\" rel=\"nofollow\">Demo<\/a>] [<a href=\"https:\/\/sn1persecurity.com\/wordpress\/external-attack-surface-management-with-sn1per\/\" rel=\"nofollow\">Find Out More<\/a>]<\/p>\n<h2 dir=\"auto\"><a id=\"user-content-attack-surface-management\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#attack-surface-management\" aria-hidden=\"true\"><\/a>Attack Surface Management<\/h2>\n<h3 dir=\"auto\"><a id=\"user-content-discover-hidden-assets-and-vulnerabilities-in-your-environment\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#discover-hidden-assets-and-vulnerabilities-in-your-environment\" aria-hidden=\"true\"><\/a>Discover hidden assets and vulnerabilities in your environment<\/h3>\n<h4 dir=\"auto\"><a id=\"user-content-find-out-more\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#find-out-more\" aria-hidden=\"true\"><\/a>[<a href=\"https:\/\/sn1persecurity.com\/wordpress\/shop\" rel=\"nofollow\">Find out more<\/a>]<\/h4>\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/37d5487977ae8a52fbbed7f416b45e928b0e126125d6968f879571959c0728ab\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d6e6176696761746f72312d332e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-Enterprise-workspace-navigator1-3.png\" \/><\/a><\/p>\n<h2 dir=\"auto\"><a id=\"user-content-the-ultimate-pentesting-toolkit\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#the-ultimate-pentesting-toolkit\" aria-hidden=\"true\"><\/a>The ultimate pentesting toolkit.<\/h2>\n<p dir=\"auto\">Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.<\/p>\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/c14432ce1daf08405c193623016dd57ed4d6af10e2f34a03abad6fcdf1e9a04b\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d776f726b73706163652d7265706f7274312d332e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-Enterprise-workspace-report1-3.png\" \/><\/a><\/p>\n<h3 dir=\"auto\"><a id=\"user-content-automate-the-most-powerful-tools\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#automate-the-most-powerful-tools\" aria-hidden=\"true\"><\/a>Automate the most powerful tools.<\/h3>\n<p dir=\"auto\">Security tools are expensive and time-consuming, but with Sn1per, you can save time by automating the execution of these open source and commercial tools to discover vulnerabilities across your entire attack surface.<\/p>\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/1b05139fc79d839799f1bb26d66822ba70be26b78728da3470f1811e524d8ef7\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374332d312e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-Enterprise-host-list3-1.png\" \/><\/a><\/p>\n<h3 dir=\"auto\"><a id=\"user-content-find-what-you-cant-see\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#find-what-you-cant-see\" aria-hidden=\"true\"><\/a>Find what you can&#8217;t see.<\/h3>\n<p dir=\"auto\">Hacking is a problem that&#8217;s only getting worse. But, with Sn1per, you can find what you can\u2019t see\u2014hidden assets and vulnerabilities in your environment.<\/p>\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/6f1e622d80962d7aa88441c41727d0eb96529282c7105a9ebc0d37dbb8755aa5\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d686f73742d6c697374322d312e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-Enterprise-host-list2-1.png\" \/><\/a><\/p>\n<h3 dir=\"auto\"><a id=\"user-content-discover-and-prioritize-risks-in-your-organization\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#discover-and-prioritize-risks-in-your-organization\" aria-hidden=\"true\"><\/a>Discover and prioritize risks in your organization.<\/h3>\n<p dir=\"auto\">Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.<\/p>\n<p dir=\"auto\"><a href=\"https:\/\/sn1persecurity.com\/\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/f214aaea665f55568101f43a5497d9d2796c29faa13c1ca1853c6aba5c626969\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30352f536e317065722d456e74657270726973652d76756c6e65726162696c6974792d7265706f7274312d332e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/05\/Sn1per-Enterprise-vulnerability-report1-3.png\" \/><\/a><\/p>\n<h3 dir=\"auto\"><a id=\"user-content-see-sn1per-in-action\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#see-sn1per-in-action\" aria-hidden=\"true\"><\/a>See Sn1per in action!<\/h3>\n<p dir=\"auto\"><a href=\"https:\/\/www.youtube.com\/c\/Sn1perSecurity\/videos\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/9531dee318280567260a3c96d385ab91207363f543ad8c162081cd588ba0b8fa\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f31302f536e31706572626f6f7463616d70736572696573312e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/10\/Sn1perbootcampseries1.png\" \/><\/a><\/p>\n<h3 dir=\"auto\"><a id=\"user-content-news\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#news\" aria-hidden=\"true\"><\/a>News<\/h3>\n<ul dir=\"auto\">\n<li>\n<h4 dir=\"auto\"><a id=\"user-content-5-ways-sn1per-can-automate-your-security-workflow\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#5-ways-sn1per-can-automate-your-security-workflow\" aria-hidden=\"true\"><\/a><a href=\"https:\/\/sn1persecurity.com\/wordpress\/5-ways-sn1per-can-automate-your-security-workflow\/\" rel=\"nofollow\">5 Ways Sn1per Can Automate Your Security Workflow<\/a><\/h4>\n<\/li>\n<li>\n<h4 dir=\"auto\"><a id=\"user-content-external-attack-surface-management-with-sn1per\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#external-attack-surface-management-with-sn1per\" aria-hidden=\"true\"><\/a><a href=\"https:\/\/sn1persecurity.com\/wordpress\/external-attack-surface-management-with-sn1per\/\" rel=\"nofollow\">External Attack Surface Management with Sn1per<\/a><\/h4>\n<\/li>\n<li>\n<h4 dir=\"auto\"><a id=\"user-content-sn1per-scan-engine-v102-released\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#sn1per-scan-engine-v102-released\" aria-hidden=\"true\"><\/a><a href=\"https:\/\/sn1persecurity.com\/wordpress\/sn1per-scan-engine-v10-2-update\/\" rel=\"nofollow\">Sn1per Scan Engine v10.2 Released!<\/a><\/h4>\n<\/li>\n<li>\n<h4 dir=\"auto\"><a id=\"user-content-sn1per-enterprise-released\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#sn1per-enterprise-released\" aria-hidden=\"true\"><\/a><a href=\"https:\/\/sn1persecurity.com\/wordpress\/sn1per-enterprise-released\/\" rel=\"nofollow\">Sn1per Enterprise Released!<\/a><\/h4>\n<\/li>\n<li>\n<h4 dir=\"auto\"><a id=\"user-content-sn1per-professional-v100-released\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#sn1per-professional-v100-released\" aria-hidden=\"true\"><\/a><a href=\"https:\/\/sn1persecurity.com\/wordpress\/sn1per-professional-v10-released\/\" rel=\"nofollow\">Sn1per Professional v10.0 Released!<\/a><\/h4>\n<\/li>\n<\/ul>\n<h2 dir=\"auto\"><a id=\"user-content-kaliubuntudebianparrot-linux-install\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#kaliubuntudebianparrot-linux-install\" aria-hidden=\"true\"><\/a>Kali\/Ubuntu\/Debian\/Parrot Linux Install<\/h2>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>git clone https:\/\/github.com\/1N3\/Sn1per\r\ncd Sn1per\r\nbash install.sh\r\n<\/code><\/pre>\n<\/div>\n<h2 dir=\"auto\"><a id=\"user-content-aws-ami-free-tier-vps-install\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#aws-ami-free-tier-vps-install\" aria-hidden=\"true\"><\/a>AWS AMI (Free Tier) VPS Install<\/h2>\n<p dir=\"auto\"><a href=\"https:\/\/aws.amazon.com\/marketplace\/pp\/prodview-rmloab6wnymno\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/412f5ad9d5200c1f53bc9f6d08292e0c25aafcb0d8c77cd5b3cfb9186e818ca1\/68747470733a2f2f736e3170657273656375726974792e636f6d2f776f726470726573732f77702d636f6e74656e742f75706c6f6164732f323032322f30362f4157532d4d61726b6574706c6163652e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/06\/AWS-Marketplace.png\" \/><\/a><\/p>\n<p dir=\"auto\">To install Sn1per using an AWS EC2 instance:<\/p>\n<ol dir=\"auto\">\n<li>Go to\u00a0<a href=\"https:\/\/aws.amazon.com\/marketplace\/pp\/prodview-rmloab6wnymno\" rel=\"nofollow\">https:\/\/aws.amazon.com\/marketplace\/pp\/prodview-rmloab6wnymno<\/a>\u00a0and click the \u201cContinue to Subscribe\u201d button<\/li>\n<li>Click the \u201cContinue to Configuration\u201d button<\/li>\n<li>Click the \u201cContinue to Launch\u201d button<\/li>\n<li>Login via SSH using the public IP of the new EC2 instance<\/li>\n<\/ol>\n<h2 dir=\"auto\"><a id=\"user-content-docker-install\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#docker-install\" aria-hidden=\"true\"><\/a>Docker Install<\/h2>\n<p dir=\"auto\"><a href=\"https:\/\/hub.docker.com\/r\/sn1persecurity\/sn1per\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/camo.githubusercontent.com\/f441071956e8d56edb638b624a901869979ca5add0435e67a079d8c477ddd51d\/68747470733a2f2f736e3170657273656375726974792e636f6d2f696d616765732f646f636b65722d6c6f676f2e706e67\" alt=\"\" data-canonical-src=\"https:\/\/sn1persecurity.com\/images\/docker-logo.png\" \/><\/a><\/p>\n<p dir=\"auto\">From a new Docker console, run the following commands.<\/p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>Download https:\/\/raw.githubusercontent.com\/1N3\/Sn1per\/master\/Dockerfile\r\ndocker build -t sn1per . \r\ndocker run -it sn1per \/bin\/bash\r\n\r\nor \r\n\r\ndocker pull xer0dayz\/sn1per\r\ndocker run -it xer0dayz\/sn1per \/bin\/bash\r\n<\/code><\/pre>\n<\/div>\n<h2 dir=\"auto\"><a id=\"user-content-usage\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#usage\" aria-hidden=\"true\"><\/a>Usage<\/h2>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\">\n<pre class=\"notranslate\"><code>[*] NORMAL MODE\r\nsniper -t &lt;TARGET&gt;\r\n\r\n[*] NORMAL MODE + OSINT + RECON\r\nsniper -t &lt;TARGET&gt; -o -re\r\n\r\n[*] STEALTH MODE + OSINT + RECON\r\nsniper -t &lt;TARGET&gt; -m stealth -o -re\r\n\r\n[*] DISCOVER MODE\r\nsniper -t &lt;CIDR&gt; -m discover -w &lt;WORSPACE_ALIAS&gt;\r\n\r\n[*] SCAN ONLY SPECIFIC PORT\r\nsniper -t &lt;TARGET&gt; -m port -p &lt;portnum&gt;\r\n\r\n[*] FULLPORTONLY SCAN MODE\r\nsniper -t &lt;TARGET&gt; -fp\r\n\r\n[*] WEB MODE - PORT 80 + 443 ONLY!\r\nsniper -t &lt;TARGET&gt; -m web\r\n\r\n[*] HTTP WEB PORT MODE\r\nsniper -t &lt;TARGET&gt; -m webporthttp -p &lt;port&gt;\r\n\r\n[*] HTTPS WEB PORT MODE\r\nsniper -t &lt;TARGET&gt; -m webporthttps -p &lt;port&gt;\r\n\r\n[*] HTTP WEBSCAN MODE\r\nsniper -t &lt;TARGET&gt; -m webscan \r\n\r\n[*] ENABLE BRUTEFORCE\r\nsniper -t &lt;TARGET&gt; -b\r\n\r\n[*] AIRSTRIKE MODE\r\nsniper -f targets.txt -m airstrike\r\n\r\n[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE &amp; LOOT ENABLED\r\nsniper -f targets.txt -m nuke -w &lt;WORKSPACE_ALIAS&gt;\r\n\r\n[*] MASS PORT SCAN MODE\r\nsniper -f targets.txt -m massportscan\r\n\r\n[*] MASS WEB SCAN MODE\r\nsniper -f targets.txt -m massweb\r\n\r\n[*] MASS WEBSCAN SCAN MODE\r\nsniper -f targets.txt -m masswebscan\r\n\r\n[*] MASS VULN SCAN MODE\r\nsniper -f targets.txt -m massvulnscan\r\n\r\n[*] PORT SCAN MODE\r\nsniper -t &lt;TARGET&gt; -m port -p &lt;PORT_NUM&gt;\r\n\r\n[*] LIST WORKSPACES\r\nsniper --list\r\n\r\n[*] DELETE WORKSPACE\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; -d\r\n\r\n[*] DELETE HOST FROM WORKSPACE\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; -t &lt;TARGET&gt; -dh\r\n\r\n[*] GET SNIPER SCAN STATUS\r\nsniper --status\r\n\r\n[*] LOOT REIMPORT FUNCTION\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; --reimport\r\n\r\n[*] LOOT REIMPORTALL FUNCTION\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; --reimportall\r\n\r\n[*] LOOT REIMPORT FUNCTION\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; --reload\r\n\r\n[*] LOOT EXPORT FUNCTION\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; --export\r\n\r\n[*] SCHEDULED SCANS\r\nsniper -w &lt;WORKSPACE_ALIAS&gt; -s daily|weekly|monthly\r\n\r\n[*] USE A CUSTOM CONFIG\r\nsniper -c \/path\/to\/sniper.conf -t &lt;TARGET&gt; -w &lt;WORKSPACE_ALIAS&gt;\r\n\r\n[*] UPDATE SNIPER\r\nsniper -u|--update\r\n<\/code><\/pre>\n<\/div>\n<h2 dir=\"auto\"><a id=\"user-content-modes\" class=\"anchor\" href=\"https:\/\/github.com\/1N3\/Sn1per#modes\" aria-hidden=\"true\"><\/a>Modes<\/h2>\n<ul dir=\"auto\">\n<li><strong>NORMAL:<\/strong>\u00a0Performs basic scan of targets and open ports using both active and passive checks for optimal performance.<\/li>\n<li><strong>STEALTH:<\/strong>\u00a0Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF\/IPS blocking.<\/li>\n<li><strong>FLYOVER:<\/strong>\u00a0Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).<\/li>\n<li><strong>AIRSTRIKE:<\/strong>\u00a0Quickly enumerates open ports\/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run .\/sn1per \/full\/path\/to\/targets.txt airstrike to begin scanning.<\/li>\n<li><strong>NUKE:<\/strong>\u00a0Launch full audit of multiple hosts specified in text file of choice. Usage example: .\/sniper \/pentest\/loot\/targets.txt nuke.<\/li>\n<li><strong>DISCOVER:<\/strong>\u00a0Parses all hosts on a subnet\/CIDR (ie. 192.168.0.0\/16) and initiates a sniper scan against each host. Useful for internal network scans.<\/li>\n<li><strong>PORT:<\/strong>\u00a0Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.<\/li>\n<li><strong>FULLPORTONLY:<\/strong>\u00a0Performs a full detailed port scan and saves results to XML.<\/li>\n<li><strong>MASSPORTSCAN:<\/strong>\u00a0Runs a &#8220;fullportonly&#8221; scan on mutiple targets specified via the &#8220;-f&#8221; switch.<\/li>\n<li><strong>WEB:<\/strong>\u00a0Adds full automatic web application scans to the results (port 80\/tcp &amp; 443\/tcp only). Ideal for web applications but may increase scan time significantly.<\/li>\n<li><strong>MASSWEB:<\/strong>\u00a0Runs &#8220;web&#8221; mode scans on multiple targets specified via the &#8220;-f&#8221; switch.<\/li>\n<li><strong>WEBPORTHTTP:<\/strong>\u00a0Launches a full HTTP web application scan against a specific host and port.<\/li>\n<li><strong>WEBPORTHTTPS:<\/strong>\u00a0Launches a full HTTPS web application scan against a specific host and port.<\/li>\n<li><strong>WEBSCAN:<\/strong>\u00a0Launches a full HTTP &amp; HTTPS web application scan against via Burpsuite and Arachni.<\/li>\n<li><strong>MASSWEBSCAN:<\/strong>\u00a0Runs &#8220;webscan&#8221; mode scans of multiple targets specified via the &#8220;-f&#8221; switch.<\/li>\n<li><strong>VULNSCAN:<\/strong>\u00a0Launches a OpenVAS vulnerability scan.<\/li>\n<li><strong>MASSVULNSCAN:<\/strong>\u00a0Launches a &#8220;vulnscan&#8221; mode scans on multiple targets specified via the &#8220;-f&#8221; switch.<\/li>\n<\/ul>\n<\/article>\n<\/div>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D763\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=763&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>README.md \u00a0\u00a0\u00a0\u00a0\u00a0 [Website] [Blog] [Shop] [Documentation] [Demo] [Find Out More] Attack Surface Management Discover hidden assets and vulnerabilities in your environment [Find out more] The ultimate pentesting toolkit. Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities. Automate the most powerful tools. Security tools are expensive [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":764,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/763"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=763"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/763\/revisions"}],"predecessor-version":[{"id":765,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/763\/revisions\/765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/764"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}