Skip to content

Instantly share code, notes, and snippets.

@robertliwpe
Created January 17, 2020 01:27
Show Gist options
  • Save robertliwpe/f02f21964c7376a311f384c5734a08ce to your computer and use it in GitHub Desktop.
Save robertliwpe/f02f21964c7376a311f384c5734a08ce to your computer and use it in GitHub Desktop.
[Sn1per Community Edition Commands]

USAGE:

[*] NORMAL MODE sniper -t

[*] NORMAL MODE + OSINT + RECON sniper -t -o -re

[*] STEALTH MODE + OSINT + RECON sniper -t -m stealth -o -re

[*] DISCOVER MODE sniper -t -m discover -w <WORSPACE_ALIAS>

[*] SCAN ONLY SPECIFIC PORT sniper -t -m port -p

[*] FULLPORTONLY SCAN MODE sniper -t -fp

[*] WEB MODE - PORT 80 + 443 ONLY! sniper -t -m web

[*] HTTP WEB PORT MODE sniper -t -m webporthttp -p

[*] HTTPS WEB PORT MODE sniper -t -m webporthttps -p

[*] HTTP WEBSCAN MODE sniper -t -m webscan

[*] ENABLE BRUTEFORCE sniper -t -b

[*] AIRSTRIKE MODE sniper -f targets.txt -m airstrike

[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>

[*] MASS PORT SCAN MODE sniper -f targets.txt -m massportscan

[*] MASS WEB SCAN MODE sniper -f targets.txt -m massweb

[*] MASS WEBSCAN SCAN MODE sniper -f targets.txt -m masswebscan

[*] MASS VULN SCAN MODE sniper -f targets.txt -m massvulnscan

[*] PORT SCAN MODE sniper -t -m port -p <PORT_NUM>

[*] LIST WORKSPACES sniper --list

[*] DELETE WORKSPACE sniper -w <WORKSPACE_ALIAS> -d

[*] DELETE HOST FROM WORKSPACE sniper -w <WORKSPACE_ALIAS> -t -dh

[*] GET SNIPER SCAN STATUS sniper --status

[*] LOOT REIMPORT FUNCTION sniper -w <WORKSPACE_ALIAS> --reimport

[*] LOOT REIMPORTALL FUNCTION sniper -w <WORKSPACE_ALIAS> --reimportall

[*] LOOT REIMPORT FUNCTION sniper -w <WORKSPACE_ALIAS> --reload

[*] SCHEDULED SCANS sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly

[*] UPDATE SNIPER sniper -u|--update

MODES:

NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.
STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.
FLYOVER: Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).
AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.
NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.
DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.
PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.
FULLPORTONLY: Performs a full detailed port scan and saves results to XML.
MASSPORTSCAN: Runs a "fullportonly" scan on mutiple targets specifified via the "-f" switch.
WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.
MASSWEB: Runs "web" mode scans on mutiple targets specifified via the "-f" switch.
WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.
WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.
WEBSCAN: Launches a full HTTP & HTTPS web application scan against via Burpsuite and Arachni.
MASSWEBSCAN: Runs "webscan" mode scans of multiple targets specified via the "-f" switch.
VULNSCAN: Launches a OpenVAS vulnerability scan.
MASSVULNSCAN: Launches a "vulnscan" mode scans on mutiple targets specifified via the "-f" switch.

SAMPLE REPORT:

https://gist.github.com/1N3/8214ec2da2c91691bcbc Help Topics

Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)
Shodan API integration (https://github.com/1N3/Sn1per/wiki/Shodan-Integration)
Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)
Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)
Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)
OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)
Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)
Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)
Sn1per Configuration Options (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Options)
Plugins & Tools (https://github.com/1N3/Sn1per/wiki/Plugins-&-Tools)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment