Sn1per

Sn1per

GitHub release License GitHub issues Last commit Contributors

GitHub Stars GitHub Forks GitHub Followers Follow on Twitter

[Products] [Solutions] [About] [News] [Contact] [Demo] [Pricing] [Shop]

Sn1per — The Offensive-Security Platform for Modern Teams

Recon, scanning, exploitation, and reporting in a single workspace — whether you’re a solo pentester or a global SOC.

Sn1per Professional 2026 is here

The largest release since v10.0 — Docker-first deployment, Bootstrap 5 / Tabler UI, Workspace Navigator, Workspace + Host Reports with CSV / Excel / PDF export, JSON API v1.0, an Offcanvas Quick Commands sidebar with 13 panels, and expanded modules for ReverseAPK, MassPwn, Threat Intel, Nessus, and Burp.

Read the release notes → · View pricing →

Table of Contents

About Sn1per

Sn1per is an offensive-security platform that consolidates reconnaissance, vulnerability scanning, exploitation, and reporting into a single workspace. Built by pentesters since 2015, it ships in three editions — a free open-source Community Edition (this repository), a paid Professional edition for individual operators and small teams, and an Enterprise edition for global SOCs — all backed by the same core scanning engine.

Sn1per orchestrates 90+ third-party tools, ships with 600+ exploits and 10,000+ detections, and is used by 500+ teams worldwide. Battle-tested by the community. Built by pentesters, for pentesters.

500+ Teams · 90+ Integrations · 10,000+ Detections · 600+ Exploits · Trusted since 2015

What’s New in 2026

Sn1per Pro 2026 Workspace Navigator

Workspace Navigator — switch contexts across hosts, scopes, and engagements.

Sn1per Pro 2026 Dashboard

Dashboard — at-a-glance scan posture, top findings, and exploitable assets.

Highlights

“Sn1per Professional 2026 is the largest release since the v10.0 line.”

Read the full release notes →

Editions & Pricing

The Community Edition is free and lives in this repository. The Professional and Enterprise editions add a Web UI, commercial integrations, and email support.

  Sn1per Professional Sn1per Enterprise
Price $984 / year (per seat) Get a quote
Subscription 1 year 1 year
— Included —    
Web UI Professional Web UI Enterprise Web UI
Scan Engine & UI Updates
All Modules & Integrations
On-Prem (Self Hosted)
Email Support 1 Year 1 Year
Improved Speed & Scalability
Cutting-Edge Features
— Limits & Quotas —    
Max Scans Unlimited Unlimited
Max Assets / Workspace 30 Unlimited
Max Workspaces 5 Unlimited
Total Assets 150 500+
Licensed Systems 1 1

Buy a Sn1per Professional license → · Get an Enterprise quote →

Install

Linux (Kali / Ubuntu / Debian / Parrot)

git clone https://github.com/1N3/Sn1per.git
cd Sn1per
sudo bash install.sh

Sn1per installs to /usr/share/sniper and requires root. Use sudo bash install.sh force to skip the confirmation prompt.

Docker

Sn1per on Docker Hub →

Kali Linux base

sudo docker compose up
sudo docker run --privileged -it sn1per-kali-linux /bin/bash

BlackArch base

sudo docker compose -f docker-compose-blackarch.yml up
sudo docker run --privileged -it sn1per-blackarch /bin/bash

AWS Marketplace (EC2 AMI)

Subscribe via AWS Marketplace:

  1. Click Continue to Subscribe
  2. Click Continue to Configuration, choose region/instance type
  3. Click Continue to Launch
  4. SSH to the EC2 public IP — Sn1per is preinstalled

Quick Start

sudo bash install.sh
sniper -t example.com -m normal

Results land in /usr/share/sniper/loot/<workspace>/. See Usage for more modes.

Usage

[*] NORMAL MODE
sniper -t <TARGET>

[*] NORMAL MODE + OSINT + RECON
sniper -t <TARGET> -o -re

[*] STEALTH MODE + OSINT + RECON
sniper -t <TARGET> -m stealth -o -re

[*] DISCOVER MODE
sniper -t <CIDR> -m discover -w <WORKSPACE_ALIAS>

[*] SCAN ONLY SPECIFIC PORT
sniper -t <TARGET> -m port -p <portnum>

[*] FULLPORTONLY SCAN MODE
sniper -t <TARGET> -fp

[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t <TARGET> -m web

[*] HTTP WEB PORT MODE
sniper -t <TARGET> -m webporthttp -p <port>

[*] HTTPS WEB PORT MODE
sniper -t <TARGET> -m webporthttps -p <port>

[*] HTTP WEBSCAN MODE
sniper -t <TARGET> -m webscan

[*] ENABLE BRUTEFORCE
sniper -t <TARGET> -b

[*] AIRSTRIKE MODE
sniper -f targets.txt -m airstrike

[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>

[*] MASS PORT SCAN MODE
sniper -f targets.txt -m massportscan

[*] MASS WEB SCAN MODE
sniper -f targets.txt -m massweb

[*] MASS WEBSCAN SCAN MODE
sniper -f targets.txt -m masswebscan

[*] MASS VULN SCAN MODE
sniper -f targets.txt -m massvulnscan

[*] PORT SCAN MODE
sniper -t <TARGET> -m port -p <PORT_NUM>

[*] LIST WORKSPACES
sniper --list

[*] DELETE WORKSPACE
sniper -w <WORKSPACE_ALIAS> -d

[*] DELETE HOST FROM WORKSPACE
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh

[*] GET SNIPER SCAN STATUS
sniper --status

[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport

[*] LOOT REIMPORTALL FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimportall

[*] LOOT RELOAD FUNCTION
sniper -w <WORKSPACE_ALIAS> --reload

[*] LOOT EXPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --export

[*] SCHEDULED SCANS
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly

[*] USE A CUSTOM CONFIG
sniper -c /path/to/sniper.conf -t <TARGET> -w <WORKSPACE_ALIAS>

[*] UPDATE SNIPER
sniper -u|--update

[*] VERBOSE OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v

[*] DEBUG OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m normal -db

[*] REMOVE RESUME FILES (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v -rr

Scan Modes

Mode Description
normal Active + passive scan of the target and its open ports
stealth Quick, mostly non-intrusive enumeration to avoid WAF / IPS
flyover Fast multi-threaded high-level scans of many hosts
airstrike Open-port enumeration + basic fingerprinting against a host file
nuke Full audit across all targets in a host file
discover Walks a CIDR and runs Sn1per on every live host
port Targeted scan of a specific port
fullportonly Full TCP port scan, results saved to XML
web Web app scan on 80/tcp + 443/tcp only
webporthttp / webporthttps Web app scan on a specific HTTP / HTTPS port
webscan Full HTTP + HTTPS web app scan via Burp Suite + Arachni
vulnscan OpenVAS vulnerability scan
mass* Multi-target variants of the above (-f targets.txt)

Integrations

Sn1per ships with native integrations for 90+ tools and services. Featured partners:

Category Integrations
Vulnerability scanners Nessus · OpenVAS · GVM 21.x · Nuclei
Web app testing Burp Suite Pro · OWASP ZAP · WPScan
Exploitation Metasploit
Reconnaissance Shodan · Censys · Hunter.io · VirusTotal · Nmap
AI / LLM OpenAI · Claude · Gemini
Notifications & DevOps Slack · GitHub API

Browse all integrations on the wiki →

Documentation & Help

Configuration & Templates

News & Releases

All releases & blog posts →

Community & Support

Contributing

Pull requests welcome. For substantial changes, open an issue first to discuss the design.

35 contributors and counting. Thank you.


About Sn1perSecurity

Sn1per is built and maintained by Sn1perSecurity, a small team of pentesters shipping offensive-security tooling since 2015. We focus on the workflows we want to use ourselves — fast recon, ergonomic reporting, honest pricing, and a Community Edition that genuinely keeps up with the commercial editions. If that resonates, say hi.

Topics: penetration-testing · offensive-security · attack-surface-management · vulnerability-scanner · recon · osint · red-team · bug-bounty · security-tools