Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
1N3
GitHub Repository: 1N3/Sn1per
Path: blob/master/CHANGELOG.md
2951 views

CHANGELOG:

  • v9.2 - Added Tomba.io API integration via OSINT mode (Credit: @benemohamed)

  • v9.2 - Fixed issue with gau tool not installing and updated GAU setting in confs

  • v9.2 - Updated python2 to python3

  • v9.2 - Removed Slurp tool

  • v9.2 - Added BlackArch Dockerfile (Credit: @AnonymousWP)

  • v9.2 - Updated DockerFile to latest Kali release (Credit: @AnonymousWP)

  • v9.1 - Fixed issue with dirsearch installation/command syntax update

  • v9.1 - Updated Nuclei sc0pe templates

  • v9.1 - Fixed issue with Nuclei sc0pe parsers not working

  • v9.1 - Fixed issue with GAU installer/commmand not working

  • v9.1 - Fixed issue with passive URL fetching

  • v9.1 - Fixed issue with nuclei not being installed

  • v9.1 - Removed error in hackertarget URL fetching

  • v9.1 - Added dnsutils to installer to fix missing deps

  • v9.1 - Fixed issue with gau in webscan modes not running

  • v9.1 - Updated subfinder to latest version

  • v9.1 - Added new email spoofing security checks to OSINT mode (-o)

  • v9.1 - Removed spoofcheck.py

  • v9.1 - Updated timeout settings for curl which was causing sockets/scans to hang

  • v9.1 - Fixed issue with Nuclei symlink missing in installer

  • v9.1 - Fixed issue with Nuclei sc0pe parser not parsing results correctly

  • v9.1 - Fixed issue with Dirsearch not running due to invalid command settings

  • v9.1 - Fixed issue with Nuclei templates not being installed

  • v9.1 - Fixed issue with enum4linux command not being installed

  • v9.1 - Fixed HackerTarget API integration

  • v9.1 - Fixed issue with ping command not being installed

  • v9.1 - Fixed issue with carriage returns in conf

  • v9.1 - Fixed issue with DNS resolution in 'discover' mode scans causing duplicate hosts

  • v9.1 - Fixed issue with bruteforce running automatically due to changes in conf file

  • v9.1 - Added verbose scan notifications for disabled conf options

  • v9.1 - Updated default aux mode options in default sniper.conf

  • v9.0 - Added Fortinet FortiGate SSL VPN Panel Detected sc0pe template

  • v9.0 - Added CVE-2020-17519 - Apache Flink Path Traversal sc0pe template

  • v9.0 - Added RabbitMQ Management Interface Detected sc0pe template

  • v9.0 - Added CVE-2020-29583 Zyxel SSH Hardcoded Credentials via BruteX

  • v9.0 - Removed vulnscan NMap CSV updates/downloads to save space/bandwidth

  • v9.0 - Added Nuclei sc0pe parser

  • v9.0 - Added Nuclei vulnerability scanner

  • v9.0 - Added Wordpress WPScan sc0pe vulnerability parser

  • v9.0 - Fixed issue with wrong WPscan API key command

  • v9.0 - Added CVE-2020-11738 - WordPress Duplicator plugin Directory Traversal sc0pe template

  • v9.0 - Renamed AUTO_VULNSCAN setting to "VULNSCAN" in sniper.conf to perform vulnerability scans via 'normal' mode

  • v8.9 - Tuned sniper.conf around performance for all scans and recon modes

  • v8.9 - Added out of scope options to config

  • v8.9 - Added automatic HTTP/HTTPS web scans and vulnerability scans to 'normal' mode

  • v8.9 - Added SolarWinds Orion Panel Default Credentials sc0pe template

  • v8.9 - Added SolarWinds Orion Panel sc0pe template

  • v8.9 - Fixed issue with UDP port scans not working

  • v8.9 - Fixed issue with theHarvester not running on Kali 2020.4

  • v8.9 - Added WPScan API support

  • v8.9 - Added CVE-2020-8209 - XenMobile-Citrix Endpoint Management Config Password Disclosure sc0pe template

  • v8.9 - Added CVE-2020-8209 - XenMobile-Citrix Endpoint Management Path Traversal sc0pe template

  • v8.9 - Removed verbose error for chromium on Ubuntu

  • v8.9 - Added CVE-2020-8209 - Citrix XenMobile Server Path Traversal sc0pe template

  • v8.9 - Fixed F+ in CSP Not Enforced sc0pe template

  • v8.9 - Added CVE-2020-14815 - Oracle Business Intelligence Enterprise DOM XSS sc0pe template

  • v8.9 - Fixed issue with dnscan not working in Kali 2020.3

  • v8.9 - Fixed issue with screenshots not working in Ubuntu 2020

  • v8.9 - Added Frontpage Service Password Disclosure sc0pe template

  • v8.9 - Removed Yasuo tool

  • v8.8 - Fixed issue with webscreenshot on Kali 2020.3+

  • v8.8 - Fixed error in install.sh for theharvester sym link

  • v8.8 - Fixed issue with flyover mode not capturing web screenshots

  • v8.8 - Added automatic 'flyover' scans of all discovered domains for 'recon' mode

  • v8.8 - Added static grep searching rules of all URL's and sub-domains (see sniper.conf for details)

  • v8.8 - Added verbose status logging to flyover mode showing HTTP status/redirect/title, etc.

  • v8.8 - Added integration for Port Scanner Add-on for Sn1per Professional

  • v8.8 - Added enhanced scanning of all unique dynamic URL's via InjectX fuzzer

  • v8.8 - Added CVE-2020-25213 - WP File Manager File Upload sc0pe template

  • v8.8 - Added cPanel Login Found sc0pe template

  • v8.8 - Added Wordpress WP-File-Manager Version Detected sc0pe template

  • v8.8 - Added VMware vCenter Unauthenticated Arbitrary File Read sc0pe template

  • v8.8 - Added PHP Composer Disclosure sc0pe template

  • v8.8 - Added Git Config Disclosure sc0pe template

  • v8.8 - Added updated NMap vulscan DB files

  • v8.8 - Added CVE-2020-9047 - exacqVision Web Service Remote Code Execution sc0pe template

  • v8.8 - Removed UDP port scan settings/options and combined with full portscan ports

  • v8.8 - Added CVE-2019-8442 - Jira Webroot Directory Traversal sc0pe template

  • v8.8 - Added CVE-2020-2034 - PAN-OS GlobalProtect OS Command Injection sc0pe template

  • v8.8 - Added CVE-2020-2551 - Unauthenticated Oracle WebLogic Server Remote Code Execution sc0pe template

  • v8.8 - Added CVE-2020-14181 - User Enumeration Via Insecure Jira Endpoint sc0pe template

  • v8.8 - Added Smuggler HTTP request smuggling detection

  • v8.8 - Added CVE-2020-0618 - Remote Code Execution SQL Server Reporting Services sc0pe template

  • v8.8 - Added CVE-2020-5412 - Full-read SSRF in Spring Cloud Netflix sc0pe template

  • v8.8 - Added Jaspersoft Detected sc0pe template

  • v8.8 - Added improved dirsearch exclude options to all web file/dir searches

  • v8.8 - Fixed naming conflict for theharvester

  • v8.8 - Created backups of all NMap HTML reports for fullportonly scans

  • v8.8 - Added line limit to GUA URL's displayed in console

  • v8.7 - Added AvantFAX LOGIN Detected sc0pe template

  • v8.7 - Updated web file bruteforce lists

  • v8.7 - Added updated Slack API integration/notifications

  • v8.7 - Added Arachni, Nikto, Nessus, NMap + 20 passive sc0pe vulnerability parsers

  • v8.7 - Added CVE-2020-15129 - Open Redirect In Traefik sc0pe template

  • v8.7 - Added MobileIron Login sc0pe template

  • v8.7 - Added Revive Adserver XSS sc0pe template

  • v8.7 - Added IceWarp Webmail XSS sc0pe template

  • v8.7 - Added Mara CMS v7.5 XSS sc0pe template

  • v8.7 - Added Administrative Privilege Escalation in SAP NetWeaver sc0pe template

  • v8.7 - Added Magento 2.3.0 SQL Injection sc0pe template

  • v8.7 - Added CVE-2020-15920 - Unauthenticated RCE at Mida eFramework sc0pe template

  • v8.7 - Added CVE-2019-7192 - QNAP Pre-Auth Root RCE sc0pe template

  • v8.7 - Added CVE-2020-10204 - Sonatype Nexus Repository RCE sc0pe template

  • v8.7 - Added CVE-2020-13167 - Netsweeper WebAdmin unixlogin.php Python Code Injection sc0pe template

  • v8.7 - Added CVE-2020-2140 - Jenkin AuditTrailPlugin XSS sc0pe template

  • v8.7 - Added CVE-2020-7209 - LinuxKI Toolset 6.01 Remote Command Execution sc0pe template

  • v8.7 - Added CVE-2019-16662 - rConfig 3.9.2 Remote Code Execution sc0pe template

  • v8.7 - Added Sitemap.xml Detected sc0pe template

  • v8.7 - Added Robots.txt Detected sc0pe template

  • v8.7 - Added AWS S3 Public Bucket Listing sc0pe template

  • v8.7 - Fixed logic error in stealth mode recon scans not running

  • v8.7 - Added CVE-2020-7048 - WP Database Reset 3.15 Unauthenticated Database Reset sc0pe template

  • v8.7 - Fixed F- detection in Wordpress Sc0pe templates

  • v8.7 - Added CVE-2020-11530 - Wordpress Chop Slider 3 Plugin SQL Injection sc0pe template

  • v8.7 - Added CVE-2019-11580 - Atlassian Crowd Data Center Unauthenticated RCE sc0pe template

  • v8.7 - Added CVE-2019-16759 - vBulletin 5.x 0-Day Pre-Auth Remote Command Execution Bypass sc0pe template

  • v8.6 - Added new Sn1per configuration flow that allows persistent user configurations and API key transfer

  • v8.6 - Updated port lists to remove duplicate ports error and slim down list

  • v8.6 - Updated PHP to 7.4

  • v8.6 - Added CVE-2020-12720 - vBulletin Unauthenticaed SQLi

  • v8.6 - Added CVE-2020-9757 - SEOmatic < 3.3.0 Server-Side Template Injection

  • v8.6 - Added CVE-2020-1147 - Remote Code Execution in Microsoft SharePoint Server

  • v8.6 - Added CVE-2020-3187 - Citrix Unauthenticated File Deletion

  • v8.6 - Added CVE-2020-8193 - Citrix Unauthenticated LFI

  • v8.6 - Added CVE-2020-8194 - Citrix ADC & NetScaler Gateway Reflected Code Injection

  • v8.6 - Added CVE-2020-8982 - Citrix ShareFile StorageZones Unauthenticated Arbitrary File Read

  • v8.6 - Added CVE-2020-9484 - Apache Tomcat RCE by deserialization

  • v8.6 - Added Cisco VPN scanner template

  • v8.6 - Added Tiki Wiki CMS scanner template

  • v8.6 - Added Palo Alto PAN OS Portal scanner template

  • v8.6 - Added SAP NetWeaver AS JAVA LM Configuration Wizard Detection

  • v8.6 - Added delete task workspace function to remove running tasks

  • v8.6 - Added CVE-2020-3452 - Cisco ASA/FTD Arbitrary File Reading Vulnerability Sc0pe template

  • v8.6 - Updated theharvester command to exclude github-code search

  • v8.6 - Updated theharvester installer to v3.1

  • v8.6 - Added urlscan.io API to OSINT mode (-o)

  • v8.6 - Added OpenVAS package to install.sh

  • v8.6 - Added Palo Alto GlobalProtect PAN-OS Portal Sc0pe template

  • v8.6 - Fixed issue with Javascript downloader downloading localhost files instead of target

  • v8.6 - Added CVE-2020-5902 F5 BIG-IP RCE sc0pe template

  • v8.6 - Added CVE-2020-5902 F5 BIG-IP XSS sc0pe template

  • v8.6 - Added F5 BIG-IP detection sc0pe template

  • v8.6 - Added interesting ports sc0pe template

  • v8.6 - Added components with known vulnerabilities sc0pe template

  • v8.6 - Added server header disclosure sc0pe template

  • v8.6 - Added SMBv1 enabled sc0pe template

  • v8.6 - Removed verbose comment from stealth scan

  • v8.5 - Added manual installer for Metasploit

  • v8.5 - Added Phantomjs manual installer

  • v8.5 - Added sc0pe template to check for default credentials via BruteX

  • v8.5 - Added fullportscans to all 'web' mode scans to ensure full port coverage

  • v8.5 - Fixed issue with 2nd stage OSINT scans not running

  • v8.5 - Added port values to sc0pe engine to define port numbers

  • v8.5 - Fixed issue with LinkFinder not working

  • v8.5 - Fixed issue with Javascript link parser

  • v8.5 - Added phantomjs dependency to fix webscreenshots on Ubuntu

  • v8.5 - Added http-default-accounts NMap NSE to check for default web credentials

  • v8.5 - Fixed several issues with install.sh to resolve deps on Ubuntu and Kali 2020.2

  • v8.5 - Removed larger wordlists to reduce install size of Sn1per

  • v8.5 - Added 20+ new active/passive sc0pe templates

  • v8.5 - Fixed issue with installer on latest Kali and Docker builds

  • v8.5 - Fixed custom installer for Arachni

  • v8.5 - Fixed Dockerfile with updated Kali image (CC. @stevemcilwain)

  • v8.4 - Added project "Sc0pe" active/passive vulnerability scanner

  • v8.4 - Added 68 new active sc0pe templates

  • v8.4 - Added 14 new passive sc0pe templates

  • v8.4 - Added OWASP ZAP API integration

  • v8.4 - Added 8 new Sn1per configuration templates (see /usr/share/sniper/conf/)

  • v8.4 - Added Gau (https://github.com/lc/gau)

  • v8.4 - Added rapiddns subdomain retrieval

  • v8.4 - Updated web content wordlists

  • v8.4 - Improved efficiency of 'web' and 'recon' mode scans

  • v8.4 - Disabled legacy Metasploit web exploits (check Sn1per conf to re-enable)

  • v8.4 - Fixed issue with dirsearch asterisk being used incorrectly

  • v8.4 - Fixed issue with airstrike mode not updated Sn1per Professional v8.0 host list

  • v8.4 - Fixed issue with webtech re.error: invalid group reference 1 at position 130

  • v8.3 - Added Github subdomain retrieval (requires API key/conf options enabled)

  • v8.3 - Added NMAP_OPTIONS setting to sniper.conf to configure optional NMap scan settings

  • v8.3 - Added option to specify custom Sn1per configuration via (-c) switch

  • v8.3 - Created several custom config files to select from, including: bug_bounty_quick, bug_bounty_max_javascript, super_stealth_mode, webpwn_only + more

  • v8.3 - Added workspace --export option to backup/export a workspace

  • v8.3 - Added flyover mode tuning options to sniper.conf

  • v8.3 - Added GitGraber automated Github leak search (https://github.com/hisxo/gitGraber)

  • v8.3 - Added static Javascript parsing for sub-domains, URL's, path relative links and comments

  • v8.3 - Added js-beautifier

  • v8.3 - Added LinkFinder Javascript link finder (https://github.com/GerbenJavado/LinkFinder)

  • v8.3 - Added fprobe HTTP probe checker (https://github.com/theblackturtle/fprobe)

  • v8.3 - Added Cisco RV320 and RV325 Unauthenticated Remote Code Execution CVE-2019-1653 MSF exploit

  • v8.3 - Improved performance of 'stealth' and 'recon' modes

  • v8.3 - Updated default port lists

  • v8.3 - Improved performance of all port scans

  • v8.3 - Added fix for missing Amass package

  • v8.3 - Added sniper.conf options for OPENVAS_HOST and OPENVAS_PORT selection for remote instances

  • v8.3 - Improved 'vulnscan' mode via OpenVAS to scan the same asset multiple times with improved error handling

  • v8.2 - Added root priv check to sniper script to run

  • v8.2 - Added NMap port change notifications via Slack

  • v8.2 - Fixed issue with firefox not loading on Kali Linux 2020.1

  • v8.2 - Fixed issue with Masswebscan mode not working

  • v8.2 - Added Rails file exposure exploit CVE-2019-5418

  • v8.2 - Updated wordlist selections to fingerprint common vulnerable applications

  • v8.2 - Added h8mail compromised credentials check to OSINT (-o) mode

  • v8.2 - Added Kali start menu app & icon for Sn1per

  • v8.2 - Added check for insecure SSL/TLS connections

  • v8.2 - Added NMAP_OPTIONS setting in ~/.sniper.conf to configure optional NMap settings

  • v8.2 - Fixed issue with ManageEngine MSF exploit payload

  • v8.2 - Added Spyse sub-domain enumeration tool (https://github.com/zeropwn/spyse.py)

  • v8.2 - Fixed issue with Subjack (open /src/github.com/haccer/subjack/fingerprints.json: no such file or directory)

  • v8.1 - Added Citrix Gateway Arbitary Code Execution CVE-2019-19781 vulnerability detection

  • v8.1 - Added Pulse Secure VPN Arbitrary File Disclosure CVE-2019-11510 exploit

  • v8.1 - Added --data-length=50 for NMap IPS evasion

  • v8.1 - Removed NMap vulscan script due to F+ results

  • v8.1 - Fixed issue with CRT.SH sub-domain retrieval

  • v8.1 - Updated Kali Linux keyring package

  • v8.1 - Fixed "[: ==: unary operator expected" in all code

  • v8.1 - Updated Sn1per Professional autoload settings

  • v8.1 - Updated web brute force wordlists

  • v8.1 - Removed null and debug errors from passive spider API output

  • v8.1 - Updated Commoncrawl index repo

  • v8.1 - Updated DockerFile repository

  • v8.1 - Fixed issue with -dh flag to delete host with Sn1per Pro v8.0

  • v8.1 - Fixed issue with subfinder missing

  • v8.1 - Fixed issue with 7zip missing

  • v8.1 - Added check for Ubuntu to install.sh automatically

  • v8.0 - Added ASnip tool to retrieve ASN's via 'recon' mode

  • v8.0 - Added Shodan sub-domain lookup

  • v8.0 - Added script timeout flag for NMap scripts

  • v8.0 - Fixed issue with dnsenum getting stuck on gathering dns info stage

  • v8.0 - Added option to force upgrade/install.sh without user prompt (ie. ./install.sh force)

  • v8.0 - Fixed issue with theHarvester package on Ubuntu systems

  • v8.0 - Fixed error "[: ==: unary operator expected" in all modes

  • v8.0 - Added net-tools package for Ubuntu OS deps

  • v7.4 - Added LDAP anomyous search to port 389/tcp checks (Shoutout @D0rkerDevil)

  • v7.4 - Added Java RMI dump registry scan checks and exploits to port 8001/tcp (Shoutout @D0rkerDevil)

  • v7.4 - Added CheckPoint Firewall-1 SecuRemote Topology Service Hostname Disclosure MSF module

  • v7.4 - Added virtualhost scanning via web mode

  • v7.4 - Added Gobuster

  • v7.4 - Addd URLCrazy DNS alterations check to OSINT mode

  • v7.4 - Added Ultratools Whois Lookups to OSINT mode

  • v7.4 - Added Email-Format.com Email Retreival to OSINT mode

  • v7.4 - Added Metasploit OSINT email retrieval to OSINT mode

  • v7.4 - Added Hackertarget URL API retrieval to web modes

  • v7.4 - Fixed error in massvulnscan mode

  • v7.4 - Fixed issue with webscreenshot.py not running

  • v7.4 - Added reverse whois DNS search via AMass

  • v7.4 - Added MassDNS IP's to master sorted IP list

  • v7.4 - Fixed issue with MassDNS installation

  • v7.4 - Fixed bad path with DNSGen

  • v7.4 - Fixed issue with AMass not running

  • v7.4 - Improved performance of AltDNS/DNSgen/MassDNS retrieval

  • v7.4 - Changed webscreenshot.py setting to use chrome browser and increased timeout

  • v7.4 - Fixed issue with missing xmlstarlet package for OpenVAS scans

  • v7.4 - Improved active web spider URL consolidation

  • v7.3 - Added CVE-2019-15107 Webmin <= 1.920 - Unauthenticated RCE MSF exploit

  • v7.3 - Added massdns plugin

  • v7.3 - Added altdns plugin

  • v7.3 - Added dnsgen plugin

  • v7.3 - Updated web file/dir wordlists from public exploits and honeypots

  • v7.3 - Added time stamps to all commands

  • v7.3 - Removed CloudFront from domain hijacking checks

  • v7.3 - Removed snmp-brute.nse script due to scan issues

  • v7.3 - Fixed issue with discover scan workspace names

  • v7.3 - Fixed issue with DockerFile (sed: can't read /usr/bin/msfdb: No such file or directory)

  • v7.3 - Fixed issue with installer on docker not having pip installed

  • v7.3 - Fixed issue with port 161 not being referenced correctly in scans

  • v7.2 - Added experimental OpenVAS API integration

  • v7.2 - Improved Burpsuite 2.x API integration with vuln reporting

  • v7.2 - Added hunter.io API integration to recon mode scans

  • v7.2 - Added Cisco IKE Key Disclosure MSF exploit

  • v7.2 - Added JBoss MSF vuln scanner module

  • v7.2 - Added Apache CouchDB RCE MSF exploit

  • v7.2 - Added IBM Tivoli Endpoint Manager POST Query Buffer Overflow exploit

  • v7.2 - Added Java RMI MSF scanner

  • v7.2 - New scan mode "vulnscan"

  • v7.2 - New scan mode "massportscan"

  • v7.2 - New scan mode "massweb"

  • v7.2 - New scan mode "masswebscan"

  • v7.2 - New scan mode "massvulnscan"

  • v7.2 - Added additional Slack API notification settings

  • v7.2 - Improved NMap port detection and scan modes

  • v7.2 - Fixed issue with Censys API being enabled by default

  • v7.2 - Fixed verbose errors in subjack/subover tools

  • v7.2 - Fixed issue with NMap http scripts not working

  • v7.1 - Added BlueKeep CVE-2019-0708 MSF scanner

  • v7.1 - Added automatic workspace generation for single target scans

  • v7.1 - Added new slack.sh API integration script

  • v7.1 - Added differential Slack notifications for new domains, new URL's and various scan outputs

  • v7.1 - Added vulners and vulscan NMap scripts

  • v7.1 - Added installer and support for Debian, Parrot and Ubuntu OS (install_debian.sh) (CC. @imhaxormad)

  • v7.1 - Fixed various issues with the DockerFile

  • v7.1 - Fixed/added Metasploit LHOST/LPORT values to all exploits based on sniper.conf settings

  • v7.1 - Fixed issue with Amass/Golang 1.11 not installing correctly

  • v7.0 - Added "webscan" mode for automated Burpsuite 2.x and Arachni web application scans only

  • v7.0 - Added Slack API notifications (Disabled by default..check ~/.sniper.conf)

  • v7.0 - Added new command switch to add daily, weekly or monthly sniper scheduled scans... check README

  • v7.0 - Added scheduled scan tasks command switch (Needs additional configuration to setup... check README)

  • v7.0 - Added Axis2 authenticated deployer MSF exploit

  • v7.0 - Added Axis2 login brute force module

  • v7.0 - Added subjack tool to check for subdomain hijacking

  • v7.0 - Added sorted IP lists under $LOOT_DIR/ips/ips-all-sorted.txt

  • v7.0 - Added subnet retrieval for all 'recon' mode scans under LOOTDIR/nmap/subnetsLOOT_DIR/nmap/subnets-TARGET.txt

  • v7.0 - Added Webscreenshot.py and disabled cutycapt from default config

  • v7.0 - Added Gobuster (Disabled by default..check ~/.sniper.conf)

  • v7.0 - Fixed issue with SubOver not working due to bad path

  • v7.0 - Fixed issue with flyover mode running 2x

  • v6.3 - Added Drupal RESET Unserialize RCE CVE-2019-6340

  • v6.2 - Added Glassfish Admin traversal MSF exploit

  • v6.2 - Added ElasticSearch Java Injection MSF RCE exploit

  • v6.2 - Added WebTech web fingerprinting tool

  • v6.2 - Added censys subdomain retrieval and API key config

  • v6.2 - Added project sonar sub-domain retrieval

  • v6.2 - Added command switch to remove workspace (-d)

  • v6.2 - Added command switch to remove host (-dh)

  • v6.2 - Added DockerFile to run Sn1per in Docker (CC. Hariom Vashisth [email protected])

  • v6.2 - Changed option to automatically import all NMap XML's into Metasploit's DB

  • v6.2 - Changed option to automatically load Sn1per Professional's report when scans complete

  • v6.2 - Added config option to enable/disable subdomain hijacking checks in sniper.conf

  • v6.2 - Fixed issue with sniper --list command having invalid reference

  • v6.2 - Fixed issue with theharvester not running

  • v6.1 - Added automated web scanning via Burpsuite Pro 2.x API for all 'web' mode scans

  • v6.1 - Added Waybackmachine URL retrieval to all web scans

  • v6.1 - Converted all exploits to Metasploit

  • v6.1 - Added configuration options to set LHOST/LPORT for all Metasploit exploits in sniper.conf

  • v6.1 - Added improved web brute forcing dictionaries for all scan modes

  • v6.1 - Added individual logging for all tools under the loot directory

  • v6.1 - Added new sniper.conf options to enabled/disable all plugins and change settings per user

  • v6.1 - Fixed issue with CMSMap install/usage

  • v6.1 - Fixed issue with WPScan gem dependency missing (public_suffix)

  • v6.1 - Fixed timeout setting in cutycapt

  • v6.1 - Fixed issue with theharvester not running correctly

  • v6.1 - Fixed issue with Amass not running due to invalid command line options in latest release

  • v6.1 - Fixed issue with Sn1per Professional notepad.html missing

  • v6.1 - Cleaned up plugins and install dependencies list

  • v6.0 - Improved scan options for discover mode scans

  • v6.0 - Fixed issue with pip3 dependency package missing

  • v6.0 - Removed iceweasel from install.sh to fix apt error

  • v5.9 - Fixed issue with auto updates not notifying users of updates

  • v5.8 - Fixed issue with subfinder not working due to lack of wordlist switch

  • v5.8 - Fixed missing osint directory/file paths

  • v5.7 - Added libSSH auth bypass scanner CVE-2018-10933

  • v5.7 - Added HTTP PUT method RCE MSF exploit

  • v5.7 - Added sniper.conf scan configuration file to customize sniper environments by user

  • v5.7 - Added modular scan mode source files

  • v5.7 - Updated wordlists for improved performance and results

  • v5.7 - Fixed issue with DNScan using an invalid path

  • v5.6 - Changed automatic report generation to "ON" for Sn1per Pro users

  • v5.5 - Added new multi-threaded high speed "flyover" mode added

  • v5.5 - Added new scan status mode via (sniper --status) command

  • v5.5 - Apache Struts CVE-2018-11776 RCE exploit

  • v5.5 - Added Android Insecure ADB RCE auto exploit

  • v5.5 - Added Apache Tomcat CVE-2017-12617 RCE exploit

  • v5.5 - Added Oracle WebLogic WLS-WSAT Component Deserialisation RCE CVE-2017-10271 MSF exploit

  • v5.5 - Added BlackWidow web application scanner with INJECTX fuzzer

  • v5.5 - Added CVE-2018-15473 SSH user enumeration script

  • v5.5 - Minor wordlist updates for web file brute forcing

  • v5.4 - Updated Golang in install.sh

  • v5.3 - Updated AMass repo in install.sh

  • v5.3 - Removed CloudFail

  • v5.3 - Fixed issue with subfinder missing brute force list

  • v5.3 - Fixed issue with invalid dnsscan reference

  • v5.2 - Added SubOver subdomain takeover scanner

  • v5.2 - Added Subfinder subdomain enumeration tool

  • v5.2 - Added Amass subdomain enumeration tool

  • v5.2 - Added configurable modules/plugins to sniper script

  • v5.2 - Added MS17-010 SMB Etternal Blue MSF exploit

  • v5.2 - Added MSF Postgresql login scanner

  • v5.2 - Added passive web spider

  • v5.2 - Added WebDav metasploit aux modules

  • v5.2 - Added NetBIOS NMap/MSF enumeration

  • v5.2 - Added SMB MSF enumeration

  • v5.2 - Added NSF MSF enumeration

  • v5.2 - Added SSH MSF enumeration

  • v5.2 - Added BadBlue Passthru MSF exploit

  • v5.2 - Added SMB GPP MSF aux module

  • v5.2 - Added Intel AMT MSF scanner

  • v5.2 - Added MySQL MSF scanner

  • v5.2 - Added MS03-026 DCOM RCE MSF exploit

  • v5.2 - Added VNC no auth MSF scanner

  • v5.2 - Added FTP MSF version scanner

  • v5.2 - Added FTP anonymous access MSF scanner

  • v5.2 - Added MS12-020 RDP MSF scanner

  • v5.2 - Added MS10-061 Spoolss MSF exploit

  • v5.2 - Added MS15-034 Sys Memory Dump MSF exploit

  • v5.2 - Added MS06-040 Netapi MSF exploit

  • v5.2 - Added MS05-039 PNP MSF exploit

  • v5.2 - Added MS12-020 Max Channels RDP scanner

  • v5.2 - Added JBoss status MSF scanner

  • v5.2 - Added Apache Struts 2 REST Plugin XStream RCE check

  • v5.2 - Added Apache Tomcat UTF8 Traversal MSF exploit

  • v5.2 - Added Apache OPTIONS Bleed MSF exploit

  • v5.2 - Added HP ILO Auth Bypass MSF exploit

  • v5.2 - Added Jooma Comfields SQL injection MSF exploit

  • v5.1 - Added dnscan to install.sh and updated sniper references which were broken

  • v5.1 - Changed default brute force list for dnscan to improve performance of scans

  • v5.1 - Removed CloudHunter and SubOver references (CC. 爱上平顶山)

  • v5.0 - Added Sn1per Pro reporting interface (see https://sn1persecurity.com for more details)

  • v5.0 - Added GPON Router RCE auto exploit

  • v5.0 - Added Cloudapp.net Azure subdomain takeover check

  • v5.0 - Added Cisco ASA Directory Traversal auto exploit (CVE-2018-0296)

  • v5.0 - Added Wig Web Information Gatherer

  • v5.0 - Added Dirsearch with custom dirsearch wordlists (quick, normal, full)

  • v5.0 - Fixed bug in installer/upgrade which copied the local dir contents to the install dir

  • v5.0 - Improved scan performance while taking web screenshots

  • v5.0 - Fixed repo issue with Slurp (Shoutz to @ifly53e)

  • v5.0 - Fixed issues with wrong ports listed in port scans (Shoutz to @ifly53e)

  • v5.0 - Minor code fixes and typos corrected (Shoutz to @ifly53e)

  • v5.0 - Updated "discover" mode scans for improved performance

  • v4.5 - Added Apache Struts 2 CVE-2017-9805 and CVE-2017-5638 detection

  • v4.5 - Added dirsearch web/file brute forcing

  • v4.5 - Added smart file/directory brute forcing to all scan modes.

  • v4.5 - Added subdomain brute force scan option to Sublist3r scan.

  • v4.4 - Fixed issue with sniper nuke and airstrike modes not running.

  • v4.4 - Added improved SNMP checks via NMap/Metasploit.

  • v4.4 - Resolved dependency issue for nfs-common package.

  • v4.4 - Fixed bug in sniper -fp command switch.

  • v4.3 - Fixed bug in version info.

  • v4.2 - Fixed bad merge in 4.1 causing sniper to break.

  • v4.1 - Fixed a few bugs with various command line switches for airstrike and nuke modes.

  • v4.1 - Fixed issue with path relative file inclusion via the -f flag. You can now include just the local filename (sniper -f targets.txt).

  • v4.0 - Added new command switch options for all sniper scans (see --help for details)

  • v4.0 - Added HTML formatted report for all workspaces to display screenshots, headers, reports and open ports

  • v4.0 - Added optional scan options such as --recon, --osint, --fullportonly --bruteforce, etc. to selectively enable scan modules. (see --help for details)

  • v4.0 - Improved Yasou scan options to include existing NMap XML files

  • v4.0 - Added automatic HTML/TXT/PDF reporting for all scans by default

  • v4.0 - Updated default workspace directory to store all loot files by TARGETnameorTARGET name or WORKSPACE alias

  • v4.0 - Added screenshot and header retrieval to loot storage

  • v4.0 - Updated NMAP SMB enum script

  • v3.0 - Improved performance of various sniper modes

  • v3.0 - Added Aquatone domain flyover tool

  • v3.0 - Added slurp S3 public AWS scanner

  • v3.0 - Updated Sub-domain hijacking site list

  • v3.0 - Changed look and feel of console output to help readability

  • v3.0 - Added online/offline check to implement changes to scans when in online vs. offline mode

  • v2.9 - New improved fullportonly scan mode

  • v2.9 - Added online check to see if there's an active internet connection

  • v2.9 - Changed default browser to firefox to clear up errors in loot commmand

  • v2.9 - Created uninstall.sh script to uninstall sniper

  • v2.9 - Removed automatic workspace creation per scan

  • v2.9 - Added curl timeout in update command to fix lag

  • v2.9 - Fixed minor NMap UDP scan flag issue

  • v2.9 - Added Metagoofil

  • v2.9 - Updated theharvester scan options to include more results

  • v2.8 - Improved discovery mode scan performance and output

  • v2.8 - Improved fullportonly scan performance

  • v2.8 - Improved startup performance options

  • v2.8 - Added Cansina web/file brute force tool

  • v2.8 - Added webporthttp and webporthttps modes

  • v2.8 - Added custerd software enumeration tool

  • v2.7 - Fixed issue with sniper update command and install.sh not running

  • v2.7 - Fixed errors with GooHak

  • v2.7 - Fixed syntax errors in sniper conditional statements

  • v2.7 - Added CloudFail

  • v2.7 - Fixed issue with [: ==: unary operator expected errors

  • v2.6 - Added Blackarch Linux support

  • v2.6 - Added $BROWSER variable to set default browser

  • v2.5g - Updated README with update command

  • v2.5f - Fixes for various bugs reported and fixed by @ifly53e (https://github.com/1N3/Sn1per/pull/89)

  • v2.5e - Fixed issue with port 3128/tcp checks (CC. @ifly53e)

  • v2.5d - Added searchsploit option for (-v) to search all terms (CC. @ifly53e)

  • v2.5c - Added various improvements to 'discover' mode scans

  • v2.5b - Removed NMap script checks for 'fullportonly' mode

  • v2.5a - Added auto-updates to check and download new versions

  • v2.5a - Fixed issue with install.sh to resolve pip aha error

  • v2.5a - Added libxml2-utils to install.sh to meet dependencies

  • v2.5 - Added HTML report generation via sniper 'loot' command

  • v2.5 - Added automatic NMap searchsploit integration to find exploits

  • v2.5 - Added various improvements to Sn1per discovery scan mode

  • v2.5 - Fixed issue with IIS BoF NMap script (CC. ifly53e)

  • v2.4f - Fixed issue with upper NMap port range(CC. DaveW)

  • v2.4e - Added NMap no ping switch to all scans

  • v2.4d - Fixed issue with rpcinfo install script

  • v2.4d - Fixed issue with Arachni install script

  • v2.4c - Added loot and $TARGET sanity checks (CC. @menzow)

  • v2.4b - Fixed issue with discovery scan output file (CC. @ifly53e)

  • v2.4b - Fixed issue with Intel AMT RCE port list

  • v2.4a - Added all NMap script checks via 'fullportonly' mode

  • v2.4a - Added JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Metasploit exploit

  • v2.4a - Added Java RMI RCE NMap/Metasploit detection

  • v2.4a - Added INTEL-SA-00075 (Intel AMT) vulnerability NMap script

  • v2.4 - Added detection for open X11 servers

  • v2.4 - Added IIS6 Win2k3 RCE NMap script

  • v2.4 - Added option to disable Google Hacking queries via Firefox

  • v2.3d - Fixed issue with loot command

  • v2.3c - Added Apache Struts 2 RCE NMap script

  • v2.3c - Added Apache Struts 2 RCE NMap exploit

  • v2.3b - Changed NMap scan options to exclude ping sweeps (-P0)

  • v2.3a - Fixed minor issue with MSSQL NMap script command (CC. @helo86)

  • v2.3 - Fixed minor issues with missing $TARGET definitions for NMap (CC. @helo86)

  • v2.2f - Added various optimizations and minor code fixes

  • v2.2e - Changed NMap scan options (removed -P0 flag)

  • v2.2d - Added MongoDB checks

  • v2.2d - Improved NMap scanning options

  • v2.2c - Added CouchDB checks

  • v2.2c - Updated Sub-domain takeover list

  • v2.2b - Added fullportonly mode to do exclusive full port scans

  • v2.2b - Fixed minor issue with Metasploit Pro not starting

  • v2.2b - Fixed minor issue with sniper loot command

  • v2.2a - Fixed minor issue with loot function

  • v2.2 - Added auto Metasploit Pro & Zenmap GUI integration

  • v2.2 - Added Sn1per workspaces to loot directory

  • v2.1d - Added crt.sh sub-domain check

  • v2.1d - Removed blank screenshots from loot directory

  • v2.1c - Fixed issue with install.sh install directories

  • v2.1b - Added automatic Metasploit NMap xml imports for loot directory

  • v2.1b - Removed Zenmap

  • v2.1a - Separated Arachni reports for port 80/443/tcp

  • v2.1a - Fixed NMap full port scan options

  • v2.1 - Added Arachni with auto HTML web reporting (web mode only)

  • v2.1 - Added full NMap detailed port scans

  • v2.1 - Added port 4443/tcp checks

  • v2.1 - Added META tag scans for web apps

  • v2.1 - Removed Uniscan from web mode

  • v2.1 - Removed SQLMap from web mode

  • v2.0b - Added help option --help

  • v2.0a - Fixed issue with ssh-audit

  • v2.0a - Fixed issue with 'discover' mode

  • v2.0 - Updated sub-domain takeover list

  • v2.0 - Improved scan performance for stealth, airstrike and discover modes

  • v2.0 - Removed jexboss due to clear screen issue with output

  • v2.0 - Auto loot directory sorting for all tools

  • v2.0 - Updated install.sh package list

  • v1.9c - Enabled BruteX automated brute force attacks

  • v1.9b - Fixed MSSQL port 1433/tcp port scan check (@hacktrack)

  • v1.9a - Removed testssl script from stealth mode scans

  • v1.9 - Added Ubuntu docker image for Sn1per (@menzow)

  • v1.9 - Added automatic loot directory sorting for all modes

  • v1.9 - Added MSSQL port 1433/tcp checks

  • v1.9 - Added SNMP port 162/tcp checks (@hexageek)

  • v1.9 - Added nslookup to install.sh

  • v1.9 - Fixed install.sh dependency duplicates

  • v1.8c - Added -A option to all NMap port scans

  • v1.8c - Fixed install.sh permission issue

  • v1.8c - Fixed install.sh cleanup options

  • v1.8c - Added ssh-audit

  • v1.8c - Added install directory (/usr/share/sniper/) to install script for universal access

  • v1.8c - Fixed issue with Metasploit SSH scans

  • v1.8c - Added auto-update to install.sh to automatically pull latest github release

  • v1.8b - Fixed bug with NMap UDP scan options

  • v1.8b - Fixed install.sh dependencies

  • v1.8b - Fixed jexboss options

  • v1.8a - Updated sub-domain hijack list of domains (CC: th3gundy)

  • v1.8 - Added sub-domain hijack scans for all sub-domains

  • v1.8 - Added auto explort of all sub-domains to /domains directory

  • v1.8 - Added additional stealth and airstrike checks for port 80 and 443

  • v1.8 - Fixed issue with theHarvester not working with google

  • v1.7g - Added email security/spoofing checks

  • v1.7f - Added Zenmap XML auto-imports

  • v1.7f - Added ClamAV RCE Nmap script

  • v1.7e - Fixed minor issue with airstrike and nuke mode

  • v1.7e - Fixed minor issues with discover mode

  • v1.7e - Added minor cosmetic improvements to reports

  • v1.7e - Disabled automatic brute forcing by default

  • v1.7e - Added automatic brute force setting in script vars

  • v1.7d - Added sslyze

  • v1.7d - Added 'discover' mode for full subnet scans

  • v1.7d - Added verbosity to scan tasks to separate sub-tasks better

  • v1.7c - Added plain text reporting

  • v1.7c - Improved loot directory structure and sorting

  • v1.7b - Fixed issue with airstrike mode not scanning correctly

  • v1.7b - Improved passive recon performance

  • v1.7a - Improved NMap http scan performance

  • v1.7a - Removed joomscan due to verbosity issues

  • v1.7 - Added uniscan web vulnerability scanner

  • v1.7 - Added joomscan Joomla scanner

  • v1.7 - Improved web scan performance

  • v1.7 - Fixed issue with inurlbr output

  • v1.7 - Added remote desktop viewing for RDP connections

  • v1.7 - Added experimental Metasploit exploit for Apache Struts RCE (CVE-2016-3081)

  • v1.6e - Added reporting option for nobrute mode (CC. @mero01)

  • v1.6e - Improved SMB scan performance/optimization added

  • v1.6d - Improved NMap scan performance options

  • v1.6d - Added xprobe2 OS finger printing tool

  • v1.6d - Added jexbos JBoss autopwn

  • v1.6d - Merged fix for theharvester package (CC. @RubenRocha)

  • v1.6d - Merged fix for SuperMicroScanner (CC. @mero01)

  • v1.6c - Add report mode for web scans

  • v1.6c - Fixed issues with Sublist3r and theharvester

  • v1.6c - Added Shocker Shellshock exploitation scanner

  • v1.6b - Added Sublist3r sub-domain brute tool

  • v1.6b - Added cutycapt web screenshot util

  • v1.6a - Added improvements to recon phase

  • v1.6a - Fixed small issue with 3rd party extension

  • v1.6a - Various improvements to overall optimization of scans

  • v1.6a - Added new "web" mode for full web application scans

  • v1.6 - Added 4 new modes including: stealth, port, airstrike and nuke

  • v1.6 - Added Java de-serialization scanner

  • v1.6 - Added reporting option to output to console and text file for all scans

  • v1.6 - Added option to set Sn1per full path for universal command line access

  • v1.6 - Added in DirBuster for web file brute forcing

  • v1.6 - Fixed issue with sderr errors in TheHarvester

  • v1.5e - Removed shodan command line tool due to issues

  • v1.5e - Fixed wafwoof installation in kali 2.0

  • v1.5d - Fixed minor issues with port 513/tmp and 514/tcp checks

  • v1.5c - Fixed issue which broke link to sniper directory

  • v1.5b - Added Squid Proxy checks port 3128/tcp

  • v1.5b - Fixed shodan setup options in install.sh

  • v1.5b - Fixed syntax error with theHarvester in install.sh

  • v1.5a - Fixed syntax error with port 8081 checks

  • v1.5a - Added Arachni integration

  • v1.5a - Added vsftpd, proftpd, mysql, unrealircd auto exploits

  • v1.5 - Added Metasploit scan and auto-exploit modules

  • v1.5 - Added additional port checks

  • v1.5 - Added full TCP/UDP NMap XML output

  • v1.5 - Auto tune scan for either IP or hostname/domain

  • v1.4h - Added auto IP/domain name scan configurations

  • v1.4g - Added finger enumeration scripts

  • v1.4g - Fixed nmap -p 445 target issue

  • v1.4g - Fixed smtp-enum target issue

  • v1.4f - Fixed BruteX directory bug

  • v1.4e - Fixed reported errors install.sh

  • v1.4e - Added auto-upgrade option to install.sh for existing Sn1per installs

  • v1.4d - Fixed missing rake gem install dependency

  • v1.4c - Reordered 3rd party extensions

  • v1.4b - Fixed install.sh executable references

  • v1.4b - Fixed Yasou dependencies in install.sh

  • v1.4b - Fixed minor issues with BruteX loot directory

  • v1.4 - Added Yasou for automatic web form brute forcing

  • v1.4 - Added MassBleed for SSL vulnerability detection

  • v1.4 - Added Breach-Miner for detection of breached accounts

  • v1.4 - Fixed minor errors with nmap

  • v1.4 - Removed debug output from goohak from displaying on console