Sn1per

April 29, 2026 · View on GitHub

Sn1per

GitHub release License GitHub issues Last commit Contributors

GitHub Stars GitHub Forks GitHub Followers Follow on Twitter

[Products] [Solutions] [About] [News] [Contact] [Demo] [Pricing] [Shop]

Sn1per — The Offensive-Security Platform for Modern Teams

Recon, scanning, exploitation, and reporting in a single workspace — whether you're a solo pentester or a global SOC.

Sn1per Professional 2026 is here

The largest release since v10.0 — Docker-first deployment, Bootstrap 5 / Tabler UI, Workspace Navigator, Workspace + Host Reports with CSV / Excel / PDF export, JSON API v1.0, an Offcanvas Quick Commands sidebar with 13 panels, and expanded modules for ReverseAPK, MassPwn, Threat Intel, Nessus, and Burp.

Read the release notes → · View pricing →

Table of Contents

About Sn1per

Sn1per is an offensive-security platform that consolidates reconnaissance, vulnerability scanning, exploitation, and reporting into a single workspace. Built by pentesters since 2015, it ships in three editions — a free open-source Community Edition (this repository), a paid Professional edition for individual operators and small teams, and an Enterprise edition for global SOCs — all backed by the same core scanning engine.

Sn1per orchestrates 90+ third-party tools, ships with 600+ exploits and 10,000+ detections, and is used by 500+ teams worldwide. Battle-tested by the community. Built by pentesters, for pentesters.

500+ Teams · 90+ Integrations · 10,000+ Detections · 600+ Exploits · Trusted since 2015

What's New in 2026

Sn1per Pro 2026 Workspace Navigator

Workspace Navigator — switch contexts across hosts, scopes, and engagements.

Sn1per Pro 2026 Dashboard

Dashboard — at-a-glance scan posture, top findings, and exploitable assets.

Highlights

  • Docker-first deployment — same image, every distro
  • Bootstrap 5 / Tabler UI — refreshed responsive interface with light + dark mode
  • Workspace Navigator — fast workspace switching with state preservation
  • Workspace & Host Reports — CSV, Excel, and PDF export
  • JSON API v1.0 — programmatic access for CI / SOAR / SIEM pipelines
  • Offcanvas Quick Commands — 13 panels, every common action one click away
  • Expanded modules — ReverseAPK, MassPwn, Threat Intel, Nessus, Burp Suite
  • Maturing SC0PE framework — more parsers, better noise reduction
  • Hardened PHP library stack — modern dependencies, audited components
  • New CLI flags-v (verbose), -db (debug), -rr (remove resume files)

"Sn1per Professional 2026 is the largest release since the v10.0 line."

Read the full release notes →

Editions & Pricing

The Community Edition is free and lives in this repository. The Professional and Enterprise editions add a Web UI, commercial integrations, and email support.

Sn1per ProfessionalSn1per Enterprise
Price$984 / year (per seat)Get a quote
Subscription1 year1 year
— Included —
Web UIProfessional Web UIEnterprise Web UI
Scan Engine & UI Updates
All Modules & Integrations
On-Prem (Self Hosted)
Email Support1 Year1 Year
Improved Speed & Scalability
Cutting-Edge Features
— Limits & Quotas —
Max ScansUnlimitedUnlimited
Max Assets / Workspace30Unlimited
Max Workspaces5Unlimited
Total Assets150500+
Licensed Systems11

Buy a Sn1per Professional license → · Get an Enterprise quote →

Install

Linux (Kali / Ubuntu / Debian / Parrot)

git clone https://github.com/1N3/Sn1per.git
cd Sn1per
sudo bash install.sh

Sn1per installs to /usr/share/sniper and requires root. Use sudo bash install.sh force to skip the confirmation prompt.

Docker

Sn1per on Docker Hub →

Kali Linux base

sudo docker compose up
sudo docker run --privileged -it sn1per-kali-linux /bin/bash

BlackArch base

sudo docker compose -f docker-compose-blackarch.yml up
sudo docker run --privileged -it sn1per-blackarch /bin/bash

AWS Marketplace (EC2 AMI)

Subscribe via AWS Marketplace:

  1. Click Continue to Subscribe
  2. Click Continue to Configuration, choose region/instance type
  3. Click Continue to Launch
  4. SSH to the EC2 public IP — Sn1per is preinstalled

Quick Start

sudo bash install.sh
sniper -t example.com -m normal

Results land in /usr/share/sniper/loot/<workspace>/. See Usage for more modes.

Usage

[*] NORMAL MODE
sniper -t <TARGET>

[*] NORMAL MODE + OSINT + RECON
sniper -t <TARGET> -o -re

[*] STEALTH MODE + OSINT + RECON
sniper -t <TARGET> -m stealth -o -re

[*] DISCOVER MODE
sniper -t <CIDR> -m discover -w <WORKSPACE_ALIAS>

[*] SCAN ONLY SPECIFIC PORT
sniper -t <TARGET> -m port -p <portnum>

[*] FULLPORTONLY SCAN MODE
sniper -t <TARGET> -fp

[*] WEB MODE - PORT 80 + 443 ONLY!
sniper -t <TARGET> -m web

[*] HTTP WEB PORT MODE
sniper -t <TARGET> -m webporthttp -p <port>

[*] HTTPS WEB PORT MODE
sniper -t <TARGET> -m webporthttps -p <port>

[*] HTTP WEBSCAN MODE
sniper -t <TARGET> -m webscan

[*] ENABLE BRUTEFORCE
sniper -t <TARGET> -b

[*] AIRSTRIKE MODE
sniper -f targets.txt -m airstrike

[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLED
sniper -f targets.txt -m nuke -w <WORKSPACE_ALIAS>

[*] MASS PORT SCAN MODE
sniper -f targets.txt -m massportscan

[*] MASS WEB SCAN MODE
sniper -f targets.txt -m massweb

[*] MASS WEBSCAN SCAN MODE
sniper -f targets.txt -m masswebscan

[*] MASS VULN SCAN MODE
sniper -f targets.txt -m massvulnscan

[*] PORT SCAN MODE
sniper -t <TARGET> -m port -p <PORT_NUM>

[*] LIST WORKSPACES
sniper --list

[*] DELETE WORKSPACE
sniper -w <WORKSPACE_ALIAS> -d

[*] DELETE HOST FROM WORKSPACE
sniper -w <WORKSPACE_ALIAS> -t <TARGET> -dh

[*] GET SNIPER SCAN STATUS
sniper --status

[*] LOOT REIMPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimport

[*] LOOT REIMPORTALL FUNCTION
sniper -w <WORKSPACE_ALIAS> --reimportall

[*] LOOT RELOAD FUNCTION
sniper -w <WORKSPACE_ALIAS> --reload

[*] LOOT EXPORT FUNCTION
sniper -w <WORKSPACE_ALIAS> --export

[*] SCHEDULED SCANS
sniper -w <WORKSPACE_ALIAS> -s daily|weekly|monthly

[*] USE A CUSTOM CONFIG
sniper -c /path/to/sniper.conf -t <TARGET> -w <WORKSPACE_ALIAS>

[*] UPDATE SNIPER
sniper -u|--update

[*] VERBOSE OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v

[*] DEBUG OUTPUT (NEW IN 2026)
sniper -t <TARGET> -m normal -db

[*] REMOVE RESUME FILES (NEW IN 2026)
sniper -t <TARGET> -m airstrike -v -rr

Scan Modes

ModeDescription
normalActive + passive scan of the target and its open ports
stealthQuick, mostly non-intrusive enumeration to avoid WAF / IPS
flyoverFast multi-threaded high-level scans of many hosts
airstrikeOpen-port enumeration + basic fingerprinting against a host file
nukeFull audit across all targets in a host file
discoverWalks a CIDR and runs Sn1per on every live host
portTargeted scan of a specific port
fullportonlyFull TCP port scan, results saved to XML
webWeb app scan on 80/tcp + 443/tcp only
webporthttp / webporthttpsWeb app scan on a specific HTTP / HTTPS port
webscanFull HTTP + HTTPS web app scan via Burp Suite + Arachni
vulnscanOpenVAS vulnerability scan
mass*Multi-target variants of the above (-f targets.txt)

Integrations

Sn1per ships with native integrations for 90+ tools and services. Featured partners:

CategoryIntegrations
Vulnerability scannersNessus · OpenVAS · GVM 21.x · Nuclei
Web app testingBurp Suite Pro · OWASP ZAP · WPScan
ExploitationMetasploit
ReconnaissanceShodan · Censys · Hunter.io · VirusTotal · Nmap
AI / LLMOpenAI · Claude · Gemini
Notifications & DevOpsSlack · GitHub API

Browse all integrations on the wiki →

Documentation & Help

Configuration & Templates

News & Releases

All releases & blog posts →

Community & Support

Contributing

Pull requests welcome. For substantial changes, open an issue first to discuss the design.

35 contributors and counting. Thank you.


About Sn1perSecurity

Sn1per is built and maintained by Sn1perSecurity, a small team of pentesters shipping offensive-security tooling since 2015. We focus on the workflows we want to use ourselves — fast recon, ergonomic reporting, honest pricing, and a Community Edition that genuinely keeps up with the commercial editions. If that resonates, say hi.

Topics: penetration-testing · offensive-security · attack-surface-management · vulnerability-scanner · recon · osint · red-team · bug-bounty · security-tools