{"id":19166370,"url":"https://github.com/1n3/attacksurfacemanagement","last_synced_at":"2026-03-14T12:16:12.165Z","repository":{"id":143252144,"uuid":"339562751","full_name":"1N3/AttackSurfaceManagement","owner":"1N3","description":"Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty ","archived":false,"fork":false,"pushed_at":"2021-09-27T01:55:30.000Z","size":34955,"stargazers_count":94,"open_issues_count":0,"forks_count":18,"subscribers_count":4,"default_branch":"master","last_synced_at":"2025-05-07T13:07:16.326Z","etag":null,"topics":["attack-surface","attacksurface","automated","bugbounty","bugbounty-platform","bugbounty-tool","cybersecurity","hacking-tool","hacking-tools","osint","penetration-testing","penetration-testing-framework","penetration-testing-tools","reconnaissance","redteam-tools","vulnerability-management","vulnerability-scanners"],"latest_commit_sha":null,"homepage":"https://sn1persecurity.com","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/1N3.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2021-02-16T23:49:54.000Z","updated_at":"2025-04-20T23:44:54.000Z","dependencies_parsed_at":null,"dependency_job_id":"830f7d2d-c989-495c-9b85-a21931020559","html_url":"https://github.com/1N3/AttackSurfaceManagement","commit_stats":null,"previous_names":[],"tags_count":51,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/1N3%2FAttackSurfaceManagement","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/1N3%2FAttackSurfaceManagement/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/1N3%2FAttackSurfaceManagement/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/1N3%2FAttackSurfaceManagement/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/1N3","download_url":"https://codeload.github.com/1N3/AttackSurfaceManagement/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":252883204,"owners_count":21819160,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["attack-surface","attacksurface","automated","bugbounty","bugbounty-platform","bugbounty-tool","cybersecurity","hacking-tool","hacking-tools","osint","penetration-testing","penetration-testing-framework","penetration-testing-tools","reconnaissance","redteam-tools","vulnerability-management","vulnerability-scanners"],"created_at":"2024-11-09T09:32:30.404Z","updated_at":"2026-03-14T12:16:12.113Z","avatar_url":"https://github.com/1N3.png","language":"Shell","readme":"[![Sn1perSecurity](https://sn1persecurity.com/images/Sn1perSecurity-Attack-Surface-Management-header1.png)](https://sn1persecurity.com)\n\n[![GitHub release](https://img.shields.io/github/release/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/releases)\n[![GitHub issues](https://img.shields.io/github/issues/1N3/Sn1per.svg)](https://github.com/1N3/Sn1per/issues)\n[![Github Stars](https://img.shields.io/github/stars/1N3/Sn1per.svg?style=social\u0026label=Stars)](https://github.com/1N3/Sn1per/)\n[![GitHub Followers](https://img.shields.io/github/followers/1N3.svg?style=social\u0026label=Follow)](https://github.com/1N3/Sn1per/)\n[![Tweet](https://img.shields.io/twitter/url/http/xer0dayz.svg?style=social)](https://twitter.com/intent/tweet?original_referer=https%3A%2F%2Fdeveloper.twitter.com%2Fen%2Fdocs%2Ftwitter-for-websites%2Ftweet-button%2Foverview\u0026ref_src=twsrc%5Etfw\u0026text=Sn1per%20-%20Automated%20Pentest%20Recon%20Scanner\u0026tw_p=tweetbutton\u0026url=https%3A%2F%2Fgithub.com%2F1N3%2FSn1per)\n[![Follow on Twitter](https://img.shields.io/twitter/follow/xer0dayz.svg?style=social\u0026label=Follow)](https://twitter.com/intent/follow?screen_name=xer0dayz)\n\n## ABOUT:\nDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional. For more information, go to https://sn1persecurity.com.\n\n[![](https://sn1persecurity.com/images/Sn1perSecurity-attack-surface-management-header2.png)](https://sn1persecurity.com/)\n\n## FEATURES:\n\n### Attack Surface Discovery\n\nEasily discover the attack surface (IPs, domain names, open ports, HTTP headers, etc.).\n\n### Penetration Testing\n\nAutomate the discovery of vulnerabilities and ethical exploitation using the latest hacking and open source security tools.\n\n### Visual Recon\n\nPerform visual recon against all hosts in your workspace using the Slideshow widget and thumbnails.\n\n### IT Asset Inventory\n\nSearch, sort and filter for DNS, IP, title, status, server headers, WAF and open TCP/UDP ports of the entire attack surface inventory.\n\n### Red Team\n\nStrengthen \"blue team\" response and detection capabilities against automated penetration testing techniques.\n\n### Notepad\n\nStore and access multiple notes in a single location to help manage your data and keep things organized.\n\n### Vulnerability Management\n\nQuickly scan for the latest vulnerabilities and CVEs using the latest commercial and open source vulnerability scanners.\n\n### Web Application Scans\n\nLaunch web application scans via Burpsuite Professional 2.x, Arachni and Nikto.\n\n### Reporting\n\nExport the entire attack surface host list and vulnerability reports to CSV, XLS or PDF format to filter, sort and view all attack surface data.\n\n### OSINT Collection\n\nCollect online documents, meta data, email addresses and contact information automatically.\n\n### Continuous Scan Coverage\n\nSchedule scans on a daily, weekly or monthly basis for continuous coverage for changes.\n\n### Bug Bounty\n\nAutomate the discovery of the attack surface and scan for the latest vulnerabilities and CVEs easily.\n\n### Notifications \u0026 Changes\n\nReceive notifications for scan and host status changes, URL and domain changes and new vulnerabilities discovered.\n\n### Domain Takeovers\n\nList all DNS records vulnerable to domain hijacking and takeover.\n\n## KALI/UBUNTU/DEBIAN/PARROT LINUX INSTALL:\n```\ngit clone https://github.com/1N3/Sn1per\ncd Sn1per\nbash install.sh\n```\n\n## DOCKER INSTALL:\n[![](https://sn1persecurity.com/images/docker-logo.png)](https://hub.docker.com/r/sn1persecurity/sn1per)\n\nFrom a new Docker console, run the following commands.\n```\nDownload https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile\ndocker build -t sn1per . \ndocker run -it sn1per /bin/bash\n\nor \n\ndocker pull sn1persecurity/sn1per\ndocker run -it sn1persecurity/sn1per /bin/bash\n```\n\n## USAGE:\n```\n[*] NORMAL MODE\nsniper -t \u003cTARGET\u003e\n\n[*] NORMAL MODE + OSINT + RECON\nsniper -t \u003cTARGET\u003e -o -re\n\n[*] STEALTH MODE + OSINT + RECON\nsniper -t \u003cTARGET\u003e -m stealth -o -re\n\n[*] DISCOVER MODE\nsniper -t \u003cCIDR\u003e -m discover -w \u003cWORSPACE_ALIAS\u003e\n\n[*] SCAN ONLY SPECIFIC PORT\nsniper -t \u003cTARGET\u003e -m port -p \u003cportnum\u003e\n\n[*] FULLPORTONLY SCAN MODE\nsniper -t \u003cTARGET\u003e -fp\n\n[*] WEB MODE - PORT 80 + 443 ONLY!\nsniper -t \u003cTARGET\u003e -m web\n\n[*] HTTP WEB PORT MODE\nsniper -t \u003cTARGET\u003e -m webporthttp -p \u003cport\u003e\n\n[*] HTTPS WEB PORT MODE\nsniper -t \u003cTARGET\u003e -m webporthttps -p \u003cport\u003e\n\n[*] HTTP WEBSCAN MODE\nsniper -t \u003cTARGET\u003e -m webscan \n\n[*] ENABLE BRUTEFORCE\nsniper -t \u003cTARGET\u003e -b\n\n[*] AIRSTRIKE MODE\nsniper -f targets.txt -m airstrike\n\n[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE \u0026 LOOT ENABLED\nsniper -f targets.txt -m nuke -w \u003cWORKSPACE_ALIAS\u003e\n\n[*] MASS PORT SCAN MODE\nsniper -f targets.txt -m massportscan\n\n[*] MASS WEB SCAN MODE\nsniper -f targets.txt -m massweb\n\n[*] MASS WEBSCAN SCAN MODE\nsniper -f targets.txt -m masswebscan\n\n[*] MASS VULN SCAN MODE\nsniper -f targets.txt -m massvulnscan\n\n[*] PORT SCAN MODE\nsniper -t \u003cTARGET\u003e -m port -p \u003cPORT_NUM\u003e\n\n[*] LIST WORKSPACES\nsniper --list\n\n[*] DELETE WORKSPACE\nsniper -w \u003cWORKSPACE_ALIAS\u003e -d\n\n[*] DELETE HOST FROM WORKSPACE\nsniper -w \u003cWORKSPACE_ALIAS\u003e -t \u003cTARGET\u003e -dh\n\n[*] GET SNIPER SCAN STATUS\nsniper --status\n\n[*] LOOT REIMPORT FUNCTION\nsniper -w \u003cWORKSPACE_ALIAS\u003e --reimport\n\n[*] LOOT REIMPORTALL FUNCTION\nsniper -w \u003cWORKSPACE_ALIAS\u003e --reimportall\n\n[*] LOOT REIMPORT FUNCTION\nsniper -w \u003cWORKSPACE_ALIAS\u003e --reload\n\n[*] LOOT EXPORT FUNCTION\nsniper -w \u003cWORKSPACE_ALIAS\u003e --export\n\n[*] SCHEDULED SCANS\nsniper -w \u003cWORKSPACE_ALIAS\u003e -s daily|weekly|monthly\n\n[*] USE A CUSTOM CONFIG\nsniper -c /path/to/sniper.conf -t \u003cTARGET\u003e -w \u003cWORKSPACE_ALIAS\u003e\n\n[*] UPDATE SNIPER\nsniper -u|--update\n```\n\n## MODES:\n* **NORMAL:** Performs basic scan of targets and open ports using both active and passive checks for optimal performance.\n* **STEALTH:** Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.\n* **FLYOVER:** Fast multi-threaded high level scans of multiple targets (useful for collecting high level data on many hosts quickly).\n* **AIRSTRIKE:** Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.\n* **NUKE:** Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.\n* **DISCOVER:** Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.\n* **PORT:** Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.\n* **FULLPORTONLY:** Performs a full detailed port scan and saves results to XML.\n* **MASSPORTSCAN:** Runs a \"fullportonly\" scan on mutiple targets specified via the \"-f\" switch.\n* **WEB:** Adds full automatic web application scans to the results (port 80/tcp \u0026 443/tcp only). Ideal for web applications but may increase scan time significantly.\n* **MASSWEB:** Runs \"web\" mode scans on multiple targets specified via the \"-f\" switch.\n* **WEBPORTHTTP:** Launches a full HTTP web application scan against a specific host and port.\n* **WEBPORTHTTPS:** Launches a full HTTPS web application scan against a specific host and port.\n* **WEBSCAN:** Launches a full HTTP \u0026 HTTPS web application scan against via Burpsuite and Arachni.\n* **MASSWEBSCAN:** Runs \"webscan\" mode scans of multiple targets specified via the \"-f\" switch.\n* **VULNSCAN:** Launches a OpenVAS vulnerability scan.\n* **MASSVULNSCAN:** Launches a \"vulnscan\" mode scans on multiple targets specified via the \"-f\" switch.\n\n## HELP TOPICS:\n- [x] Plugins \u0026 Tools (https://github.com/1N3/Sn1per/wiki/Plugins-\u0026-Tools)\n- [x] Scheduled scans (https://github.com/1N3/Sn1per/wiki/Scheduled-Scans)\n- [x] Sn1per Configuration Options (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Options)\n- [x] Sn1per Configuration Templates (https://github.com/1N3/Sn1per/wiki/Sn1per-Configuration-Templates)\n- [x] Sc0pe Templates (https://github.com/1N3/Sn1per/wiki/Sc0pe-Templates)\n\n## INTEGRATION GUIDES:\n- [x] Github API integration (https://github.com/1N3/Sn1per/wiki/Github-API-Integration)\n- [x] Burpsuite Professional 2.x integration (https://github.com/1N3/Sn1per/wiki/Burpsuite-Professional-2.x-Integration)\n- [x] OWASP ZAP integration (https://github.com/1N3/Sn1per/wiki/OWASP-ZAP-Integration)\n- [x] Shodan API integration (https://github.com/1N3/Sn1per/wiki/Shodan-Integration)\n- [x] Censys API integration (https://github.com/1N3/Sn1per/wiki/Censys-API-Integration)\n- [x] Hunter.io API integration (https://github.com/1N3/Sn1per/wiki/Hunter.io-API-Integration)\n- [x] Metasploit integration (https://github.com/1N3/Sn1per/wiki/Metasploit-Integration)\n- [x] Nessus integration (https://github.com/1N3/Sn1per/wiki/Nessus-Integration)\n- [x] OpenVAS API integration (https://github.com/1N3/Sn1per/wiki/OpenVAS-Integration)\n- [x] Slack API integration (https://github.com/1N3/Sn1per/wiki/Slack-API-Integration)\n- [x] WPScan API integration (https://github.com/1N3/Sn1per/wiki/WPScan-API-Integration)\n\n## LICENSE:\nThis software is free to distribute and use with the condition that credit is provided to the creator (@xer0dayz @Sn1perSecurity), is not renamed and is not for commercial use or resold and rebranded. Permission to distribute any part of the code for sale is strictly prohibited.\n\n## LEGAL DISCLAIMER:\nYou may not rent or lease, distribute, modify, sell or transfer the software to a third party. Sn1per Community is free for distribution, and modification with the condition that credit is provided to the creator and not used for commercial use. You may not use software for illegal or nefarious purposes. No liability for consequential damages to the maximum extent permitted by all applicable laws. In no event shall Sn1perSecurity or any person be liable for any consequential, reliance, incidental, special, direct or indirect damages whatsoever (including without limitation, damages for loss of business profits, business interruption, loss of business information, personal injury, or any other loss) arising out of or in connection with the use or inability to use this product, even if Sn1perSecurity has been advised of the possibility of such damages.\n\n## COPYRIGHT:\nThe software code and logos are owned by Sn1perSecurity and protected by United States copyright and/or patent laws of international treaty provisions. All rights reserved.\n\n## PURCHASE SN1PER PROFESSIONAL:\nTo obtain a Sn1per Professional license, go to https://sn1persecurity.com.\n\nAttack Surface Management (ASM) | Continuous Attack Surface Testing (CAST) | Attack Surface Software | Attack Surface Platform | Continuous Automated Red Teaming (CART) |  Vulnerability \u0026 Attack Surface Management | Red Team | Threat Intel | Application Security | Cybersecurity | IT Asset Discovery | Automated Penetration Testing | Hacking Tools | Recon Tool | Bug Bounty Tool | Vulnerability Scanner | Attack Surface Analysis | Attack Surface Reduction | Attack Surface Detector | Attack Surface Monitoring | Attack Surface Review | Attack Surface Discovery | Digital Threat Management | Risk Assessment | Threat Remediation | Offensive Security Framework | Automated Penetration Testing Framework | External Threat Management | Internal IT Asset Discovery | Security Orchestration and Automation (SOAR)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F1n3%2Fattacksurfacemanagement","html_url":"https://awesome.ecosyste.ms/projects/github.com%2F1n3%2Fattacksurfacemanagement","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F1n3%2Fattacksurfacemanagement/lists"}