Multi Purpose Hacking/ Pentesting Tools
What is SN1PER
Sn1per is an automated scanner tool that is usually used during a penetration test to enumerate and scan for vulnerabilities.
Is SN1PER free?
SN1PER is free to use and is recommended to be used on a Kali Linux platform.
What are the Typical Uses for SN1PER
SN1PER is primarily used to collect information during a penetration tests. Various modes of SN1PER includes:
#REPORTOutputs all results to text in the loot directory for later reference. To enable reporting, append ‘report’ to any sniper mode or command.
#STEALTHQuickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.
#DISCOVERParses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
#PORTScans a specific port for vulnerabilities. Reporting is not currently available in this mode.
#FULLPORTONLYPerforms a full detailed port scan and saves results to XML.
#WEBAdds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
#NOBRUTELaunches a full scan against a target host/domain without brute forcing services.
#AIRSTRIKEQuickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IP’s that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.
#NUKELaunch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.
#LOOTAutomatically organizes and displays loot folder in your browser and opens Metasploit Pro and Zenmap GUI with all port scan results. To run, type ‘sniper loot’.
How To Install SN1PER
This tool works best on Linux, preferably something like Kali Linux, Backbox or any other flavours therein for Pentesting Purposes.
git clone https://github.com/1N3/Sn1per.git
chmod +x install.sh
Enjoy and use responsibly!