Kazani on Nostr: 🤨 Automated reconnaissance and penetration scanning tool Sn1per is an automated ...
🤨 Automated reconnaissance and penetration scanning tool
Sn1per is an automated reconnaissance and penetration scanning tool. The program can be used during a penetration test to enumerate and scan vulnerabilities.
Functions:
🔵 Automatic collection of basic reconnaissance data (e.g. whois, ping, DNS, etc.)
🔵 Automatically launch hacker queries into Google search against the target domain
🔵 Automatic listing of open ports
🔵 Automatic brute force of subdomains and DNS information
🔵 Automatically run target NMap scripts against open ports
🔵 Automatically launch Metasploit targeted scans and exploit modules
🔵 Automatically scan all web applications for popular vulnerabilities
🔵 Automatic brute force of all open services
🔵 Automatic exploitation of remote hosts to gain access to a remote shell
🔵 Performs a high-level enumeration of a set of hosts
🔵 Auto-pwn added for Metasploitable, ShellShock, MS08-067, Tomcat Default Credentials
⛓
https://github.com/1N3/Sn1perPublished at
2025-01-18 07:12:31Event JSON
{
"id": "d5c4e347993abacb6f917a7426f9de4719e4e60af38e94fb0b05b8531489f457",
"pubkey": "66f47e3dcfe5c9281b436bf4ae443c4893d3c1b17ce503223f8043d3bfbdfb2f",
"created_at": 1737184351,
"kind": 1,
"tags": [],
"content": "🤨 Automated reconnaissance and penetration scanning tool\n\nSn1per is an automated reconnaissance and penetration scanning tool. The program can be used during a penetration test to enumerate and scan vulnerabilities.\n\nFunctions:\n🔵 Automatic collection of basic reconnaissance data (e.g. whois, ping, DNS, etc.)\n🔵 Automatically launch hacker queries into Google search against the target domain\n🔵 Automatic listing of open ports\n🔵 Automatic brute force of subdomains and DNS information\n🔵 Automatically run target NMap scripts against open ports\n🔵 Automatically launch Metasploit targeted scans and exploit modules\n🔵 Automatically scan all web applications for popular vulnerabilities\n🔵 Automatic brute force of all open services\n🔵 Automatic exploitation of remote hosts to gain access to a remote shell\n🔵 Performs a high-level enumeration of a set of hosts\n🔵 Auto-pwn added for Metasploitable, ShellShock, MS08-067, Tomcat Default Credentials\n\n⛓ https://github.com/1N3/Sn1per",
"sig": "cf66f3158338e38a08ee40f4c884430ca8c39bfc47c99a0a137d42e8cb0435c05a203e5ecc86f749ce399108815105a96e72e037ee9e81163b04815ddc8a9e9c"
}