[Products] [Solutions] [About] [News] [Contact] [Demo] [Pricing] [Shop] Recon, scanning, exploitation, and reporting in a single workspace — whether you're a solo pentester or a global SOC. The largest release since v10.0 — Docker-first deployment, Bootstrap 5 / Tabler UI, Workspace Navigator, Workspace + Host Reports with CSV / Excel / PDF export, JSON API v1.0, an Offcanvas Quick Commands sidebar with 13 panels, and expanded modules for ReverseAPK, MassPwn, Threat Intel, Nessus, and Burp. Sn1per is an offensive-security platform that consolidates reconnaissance, vulnerability scanning, exploitation, and reporting into a single workspace. Built by pentesters since 2015, it ships in three editions — a free open-source Community Edition (this repository), a paid Professional edition for individual operators and small teams, and an Enterprise edition for global SOCs — all backed by the same core scanning engine. Sn1per orchestrates 90+ third-party tools, ships with 600+ exploits and 10,000+ detections, and is used by 500+ teams worldwide. Battle-tested by the community. Built by pentesters, for pentesters. 500+ Teams · 90+ Integrations · 10,000+ Detections · 600+ Exploits · Trusted since 2015 Workspace Navigator — switch contexts across hosts, scopes, and engagements. Dashboard — at-a-glance scan posture, top findings, and exploitable assets. "Sn1per Professional 2026 is the largest release since the v10.0 line." The Community Edition is free and lives in this repository. The Professional and Enterprise editions add a Web UI, commercial integrations, and email support. Buy a Sn1per Professional license → · Get an Enterprise quote → Sn1per installs to Subscribe via AWS Marketplace: Results land in Sn1per ships with native integrations for 90+ tools and services. Featured partners: Browse all integrations on the wiki → Pull requests welcome. For substantial changes, open an issue first to discuss the design. 35 contributors and counting. Thank you. Sn1per is built and maintained by Sn1perSecurity, a small team of pentesters shipping offensive-security tooling since 2015. We focus on the workflows we want to use ourselves — fast recon, ergonomic reporting, honest pricing, and a Community Edition that genuinely keeps up with the commercial editions. If that resonates, say hi. Topics: -v (verbose), -db (debug), -rr (remove resume files)Sn1per Professional Sn1per Enterprise Price $984 / year (per seat) Get a quote Subscription 1 year 1 year — Included — Web UI Professional Web UI Enterprise Web UI Scan Engine & UI Updates ✓ ✓ All Modules & Integrations ✓ ✓ On-Prem (Self Hosted) ✓ ✓ Email Support 1 Year 1 Year Improved Speed & Scalability — ✓ Cutting-Edge Features — ✓ — Limits & Quotas — Max Scans Unlimited Unlimited Max Assets / Workspace 30 Unlimited Max Workspaces 5 Unlimited Total Assets 150 500+ Licensed Systems 1 1 git clone https://github.com/1N3/Sn1per.git
cd Sn1per
sudo bash install.sh/usr/share/sniper and requires root. Use sudo bash install.sh force to skip the confirmation prompt.sudo docker compose up
sudo docker run --privileged -it sn1per-kali-linux /bin/bash
sudo docker compose -f docker-compose-blackarch.yml up
sudo docker run --privileged -it sn1per-blackarch /bin/bash
sudo bash install.sh
sniper -t example.com -m normal
/usr/share/sniper/loot/<workspace>/. See Usage for more modes.[*] NORMAL MODE
sniper -t <TARGET>
[*] NORMAL MODE + OSINT + RECON
sniper -t <TARGET> -o -re
[*] STEALTH MODE + OSINT + RECON
sniper -t <TARGET> -m stealth -o -re
[*] DISCOVER MODE
sniper -t <CIDR> -m discover -w <WORKSPACE_ALIAS>
[*] SCAN ONLY SPECIFIC PORT
sniper -t <TARGET> -m port -p <portnum>
[*] FULLPORTONLY SCAN MODE
sniper -t <TARGET> -fp
[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t <TARGET> -m web
[*] HTTP WEB PORT MODE
sniper -t <TARGET> -m webporthttp -p <port>
[*] HTTPS WEB PORT MODE
sniper -t <TARGET> -m webporthttps -p <port>
[*] HTTP WEBSCAN MODE
sniper -t <TARGET> -m webscan
[*] ENABLE BRUTEFORCE
sniper -t <TARGET> -b
[*] AIRSTRIKE MODE
sniper -f targets.txt -m airstrike
[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>
[*] MASS PORT SCAN MODE
sniper -f targets.txt -m massportscan
[*] MASS WEB SCAN MODE
sniper -f targets.txt -m massweb
[*] MASS WEBSCAN SCAN MODE
sniper -f targets.txt -m masswebscan
[*] MASS VULN SCAN MODE
sniper -f targets.txt -m massvulnscan
[*] PORT SCAN MODE
sniper -t <TARGET> -m port -p <PORT_NUM>
[*] LIST WORKSPACES
sniper --list
[*] DELETE WORKSPACE
sniper -w <WORKSPACE_ALIAS> -d
[*] DELETE HOST FROM WORKSPACE
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh
[*] GET SNIPER SCAN STATUS
sniper --status
[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport
[*] LOOT REIMPORTALL FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimportall
[*] LOOT RELOAD FUNCTION
sniper -w <WORKSPACE_ALIAS> --reload
[*] LOOT EXPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --export
[*] SCHEDULED SCANS
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly
[*] USE A CUSTOM CONFIG
sniper -c /path/to/sniper.conf -t <TARGET> -w <WORKSPACE_ALIAS>
[*] UPDATE SNIPER
sniper -u|--update
[*] VERBOSE OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v
[*] DEBUG OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m normal -db
[*] REMOVE RESUME FILES (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v -rr
Mode Description normalActive + passive scan of the target and its open ports stealthQuick, mostly non-intrusive enumeration to avoid WAF / IPS flyoverFast multi-threaded high-level scans of many hosts airstrikeOpen-port enumeration + basic fingerprinting against a host file nukeFull audit across all targets in a host file discoverWalks a CIDR and runs Sn1per on every live host portTargeted scan of a specific port fullportonlyFull TCP port scan, results saved to XML webWeb app scan on 80/tcp + 443/tcp only
webporthttp / webporthttpsWeb app scan on a specific HTTP / HTTPS port webscanFull HTTP + HTTPS web app scan via Burp Suite + Arachni vulnscanOpenVAS vulnerability scan mass*Multi-target variants of the above ( -f targets.txt)Category Integrations Vulnerability scanners
Nessus · OpenVAS · GVM 21.x · Nuclei Web app testing
Burp Suite Pro · OWASP ZAP · WPScan Exploitation Metasploit Reconnaissance
Shodan · Censys · Hunter.io · VirusTotal · Nmap AI / LLM OpenAI · Claude · Gemini Notifications & DevOps
Slack · GitHub API modes/ — one bash file per scan modeCHANGELOG.mdLICENSE.md and THIRD_PARTY_LICENSES.mdNOTICEpenetration-testing · offensive-security · attack-surface-management · vulnerability-scanner · recon · osint · red-team · bug-bounty · security-tools


