Skip to content

Latest commit

 

History

History
621 lines (621 loc) · 37.2 KB

CHANGELOG.md

File metadata and controls

621 lines (621 loc) · 37.2 KB

CHANGELOG:

  • v9.2 - Added Tomba.io API integration via OSINT mode (Credit: @benemohamed)
  • v9.2 - Fixed issue with gau tool not installing and updated GAU setting in confs
  • v9.2 - Updated python2 to python3
  • v9.2 - Removed Slurp tool
  • v9.2 - Added BlackArch Dockerfile (Credit: @AnonymousWP)
  • v9.2 - Updated DockerFile to latest Kali release (Credit: @AnonymousWP)
  • v9.1 - Fixed issue with dirsearch installation/command syntax update
  • v9.1 - Updated Nuclei sc0pe templates
  • v9.1 - Fixed issue with Nuclei sc0pe parsers not working
  • v9.1 - Fixed issue with GAU installer/commmand not working
  • v9.1 - Fixed issue with passive URL fetching
  • v9.1 - Fixed issue with nuclei not being installed
  • v9.1 - Removed error in hackertarget URL fetching
  • v9.1 - Added dnsutils to installer to fix missing deps
  • v9.1 - Fixed issue with gau in webscan modes not running
  • v9.1 - Updated subfinder to latest version
  • v9.1 - Added new email spoofing security checks to OSINT mode (-o)
  • v9.1 - Removed spoofcheck.py
  • v9.1 - Updated timeout settings for curl which was causing sockets/scans to hang
  • v9.1 - Fixed issue with Nuclei symlink missing in installer
  • v9.1 - Fixed issue with Nuclei sc0pe parser not parsing results correctly
  • v9.1 - Fixed issue with Dirsearch not running due to invalid command settings
  • v9.1 - Fixed issue with Nuclei templates not being installed
  • v9.1 - Fixed issue with enum4linux command not being installed
  • v9.1 - Fixed HackerTarget API integration
  • v9.1 - Fixed issue with ping command not being installed
  • v9.1 - Fixed issue with carriage returns in conf
  • v9.1 - Fixed issue with DNS resolution in 'discover' mode scans causing duplicate hosts
  • v9.1 - Fixed issue with bruteforce running automatically due to changes in conf file
  • v9.1 - Added verbose scan notifications for disabled conf options
  • v9.1 - Updated default aux mode options in default sniper.conf
  • v9.0 - Added Fortinet FortiGate SSL VPN Panel Detected sc0pe template
  • v9.0 - Added CVE-2020-17519 - Apache Flink Path Traversal sc0pe template
  • v9.0 - Added RabbitMQ Management Interface Detected sc0pe template
  • v9.0 - Added CVE-2020-29583 Zyxel SSH Hardcoded Credentials via BruteX
  • v9.0 - Removed vulnscan NMap CSV updates/downloads to save space/bandwidth
  • v9.0 - Added Nuclei sc0pe parser
  • v9.0 - Added Nuclei vulnerability scanner
  • v9.0 - Added Wordpress WPScan sc0pe vulnerability parser
  • v9.0 - Fixed issue with wrong WPscan API key command
  • v9.0 - Added CVE-2020-11738 - WordPress Duplicator plugin Directory Traversal sc0pe template
  • v9.0 - Renamed AUTO_VULNSCAN setting to "VULNSCAN" in sniper.conf to perform vulnerability scans via 'normal' mode
  • v8.9 - Tuned sniper.conf around performance for all scans and recon modes
  • v8.9 - Added out of scope options to config
  • v8.9 - Added automatic HTTP/HTTPS web scans and vulnerability scans to 'normal' mode
  • v8.9 - Added SolarWinds Orion Panel Default Credentials sc0pe template
  • v8.9 - Added SolarWinds Orion Panel sc0pe template
  • v8.9 - Fixed issue with UDP port scans not working
  • v8.9 - Fixed issue with theHarvester not running on Kali 2020.4
  • v8.9 - Added WPScan API support
  • v8.9 - Added CVE-2020-8209 - XenMobile-Citrix Endpoint Management Config Password Disclosure sc0pe template
  • v8.9 - Added CVE-2020-8209 - XenMobile-Citrix Endpoint Management Path Traversal sc0pe template
  • v8.9 - Removed verbose error for chromium on Ubuntu
  • v8.9 - Added CVE-2020-8209 - Citrix XenMobile Server Path Traversal sc0pe template
  • v8.9 - Fixed F+ in CSP Not Enforced sc0pe template
  • v8.9 - Added CVE-2020-14815 - Oracle Business Intelligence Enterprise DOM XSS sc0pe template
  • v8.9 - Fixed issue with dnscan not working in Kali 2020.3
  • v8.9 - Fixed issue with screenshots not working in Ubuntu 2020
  • v8.9 - Added Frontpage Service Password Disclosure sc0pe template
  • v8.9 - Removed Yasuo tool
  • v8.8 - Fixed issue with webscreenshot on Kali 2020.3+
  • v8.8 - Fixed error in install.sh for theharvester sym link
  • v8.8 - Fixed issue with flyover mode not capturing web screenshots
  • v8.8 - Added automatic 'flyover' scans of all discovered domains for 'recon' mode
  • v8.8 - Added static grep searching rules of all URL's and sub-domains (see sniper.conf for details)
  • v8.8 - Added verbose status logging to flyover mode showing HTTP status/redirect/title, etc.
  • v8.8 - Added integration for Port Scanner Add-on for Sn1per Professional
  • v8.8 - Added enhanced scanning of all unique dynamic URL's via InjectX fuzzer
  • v8.8 - Added CVE-2020-25213 - WP File Manager File Upload sc0pe template
  • v8.8 - Added cPanel Login Found sc0pe template
  • v8.8 - Added Wordpress WP-File-Manager Version Detected sc0pe template
  • v8.8 - Added VMware vCenter Unauthenticated Arbitrary File Read sc0pe template
  • v8.8 - Added PHP Composer Disclosure sc0pe template
  • v8.8 - Added Git Config Disclosure sc0pe template
  • v8.8 - Added updated NMap vulscan DB files
  • v8.8 - Added CVE-2020-9047 - exacqVision Web Service Remote Code Execution sc0pe template
  • v8.8 - Removed UDP port scan settings/options and combined with full portscan ports
  • v8.8 - Added CVE-2019-8442 - Jira Webroot Directory Traversal sc0pe template
  • v8.8 - Added CVE-2020-2034 - PAN-OS GlobalProtect OS Command Injection sc0pe template
  • v8.8 - Added CVE-2020-2551 - Unauthenticated Oracle WebLogic Server Remote Code Execution sc0pe template
  • v8.8 - Added CVE-2020-14181 - User Enumeration Via Insecure Jira Endpoint sc0pe template
  • v8.8 - Added Smuggler HTTP request smuggling detection
  • v8.8 - Added CVE-2020-0618 - Remote Code Execution SQL Server Reporting Services sc0pe template
  • v8.8 - Added CVE-2020-5412 - Full-read SSRF in Spring Cloud Netflix sc0pe template
  • v8.8 - Added Jaspersoft Detected sc0pe template
  • v8.8 - Added improved dirsearch exclude options to all web file/dir searches
  • v8.8 - Fixed naming conflict for theharvester
  • v8.8 - Created backups of all NMap HTML reports for fullportonly scans
  • v8.8 - Added line limit to GUA URL's displayed in console
  • v8.7 - Added AvantFAX LOGIN Detected sc0pe template
  • v8.7 - Updated web file bruteforce lists
  • v8.7 - Added updated Slack API integration/notifications
  • v8.7 - Added Arachni, Nikto, Nessus, NMap + 20 passive sc0pe vulnerability parsers
  • v8.7 - Added CVE-2020-15129 - Open Redirect In Traefik sc0pe template
  • v8.7 - Added MobileIron Login sc0pe template
  • v8.7 - Added Revive Adserver XSS sc0pe template
  • v8.7 - Added IceWarp Webmail XSS sc0pe template
  • v8.7 - Added Mara CMS v7.5 XSS sc0pe template
  • v8.7 - Added Administrative Privilege Escalation in SAP NetWeaver sc0pe template
  • v8.7 - Added Magento 2.3.0 SQL Injection sc0pe template
  • v8.7 - Added CVE-2020-15920 - Unauthenticated RCE at Mida eFramework sc0pe template
  • v8.7 - Added CVE-2019-7192 - QNAP Pre-Auth Root RCE sc0pe template
  • v8.7 - Added CVE-2020-10204 - Sonatype Nexus Repository RCE sc0pe template
  • v8.7 - Added CVE-2020-13167 - Netsweeper WebAdmin unixlogin.php Python Code Injection sc0pe template
  • v8.7 - Added CVE-2020-2140 - Jenkin AuditTrailPlugin XSS sc0pe template
  • v8.7 - Added CVE-2020-7209 - LinuxKI Toolset 6.01 Remote Command Execution sc0pe template
  • v8.7 - Added CVE-2019-16662 - rConfig 3.9.2 Remote Code Execution sc0pe template
  • v8.7 - Added Sitemap.xml Detected sc0pe template
  • v8.7 - Added Robots.txt Detected sc0pe template
  • v8.7 - Added AWS S3 Public Bucket Listing sc0pe template
  • v8.7 - Fixed logic error in stealth mode recon scans not running
  • v8.7 - Added CVE-2020-7048 - WP Database Reset 3.15 Unauthenticated Database Reset sc0pe template
  • v8.7 - Fixed F- detection in Wordpress Sc0pe templates
  • v8.7 - Added CVE-2020-11530 - Wordpress Chop Slider 3 Plugin SQL Injection sc0pe template
  • v8.7 - Added CVE-2019-11580 - Atlassian Crowd Data Center Unauthenticated RCE sc0pe template
  • v8.7 - Added CVE-2019-16759 - vBulletin 5.x 0-Day Pre-Auth Remote Command Execution Bypass sc0pe template
  • v8.6 - Added new Sn1per configuration flow that allows persistent user configurations and API key transfer
  • v8.6 - Updated port lists to remove duplicate ports error and slim down list
  • v8.6 - Updated PHP to 7.4
  • v8.6 - Added CVE-2020-12720 - vBulletin Unauthenticaed SQLi
  • v8.6 - Added CVE-2020-9757 - SEOmatic < 3.3.0 Server-Side Template Injection
  • v8.6 - Added CVE-2020-1147 - Remote Code Execution in Microsoft SharePoint Server
  • v8.6 - Added CVE-2020-3187 - Citrix Unauthenticated File Deletion
  • v8.6 - Added CVE-2020-8193 - Citrix Unauthenticated LFI
  • v8.6 - Added CVE-2020-8194 - Citrix ADC & NetScaler Gateway Reflected Code Injection
  • v8.6 - Added CVE-2020-8982 - Citrix ShareFile StorageZones Unauthenticated Arbitrary File Read
  • v8.6 - Added CVE-2020-9484 - Apache Tomcat RCE by deserialization
  • v8.6 - Added Cisco VPN scanner template
  • v8.6 - Added Tiki Wiki CMS scanner template
  • v8.6 - Added Palo Alto PAN OS Portal scanner template
  • v8.6 - Added SAP NetWeaver AS JAVA LM Configuration Wizard Detection
  • v8.6 - Added delete task workspace function to remove running tasks
  • v8.6 - Added CVE-2020-3452 - Cisco ASA/FTD Arbitrary File Reading Vulnerability Sc0pe template
  • v8.6 - Updated theharvester command to exclude github-code search
  • v8.6 - Updated theharvester installer to v3.1
  • v8.6 - Added urlscan.io API to OSINT mode (-o)
  • v8.6 - Added OpenVAS package to install.sh
  • v8.6 - Added Palo Alto GlobalProtect PAN-OS Portal Sc0pe template
  • v8.6 - Fixed issue with Javascript downloader downloading localhost files instead of target
  • v8.6 - Added CVE-2020-5902 F5 BIG-IP RCE sc0pe template
  • v8.6 - Added CVE-2020-5902 F5 BIG-IP XSS sc0pe template
  • v8.6 - Added F5 BIG-IP detection sc0pe template
  • v8.6 - Added interesting ports sc0pe template
  • v8.6 - Added components with known vulnerabilities sc0pe template
  • v8.6 - Added server header disclosure sc0pe template
  • v8.6 - Added SMBv1 enabled sc0pe template
  • v8.6 - Removed verbose comment from stealth scan
  • v8.5 - Added manual installer for Metasploit
  • v8.5 - Added Phantomjs manual installer
  • v8.5 - Added sc0pe template to check for default credentials via BruteX
  • v8.5 - Added fullportscans to all 'web' mode scans to ensure full port coverage
  • v8.5 - Fixed issue with 2nd stage OSINT scans not running
  • v8.5 - Added port values to sc0pe engine to define port numbers
  • v8.5 - Fixed issue with LinkFinder not working
  • v8.5 - Fixed issue with Javascript link parser
  • v8.5 - Added phantomjs dependency to fix webscreenshots on Ubuntu
  • v8.5 - Added http-default-accounts NMap NSE to check for default web credentials
  • v8.5 - Fixed several issues with install.sh to resolve deps on Ubuntu and Kali 2020.2
  • v8.5 - Removed larger wordlists to reduce install size of Sn1per
  • v8.5 - Added 20+ new active/passive sc0pe templates
  • v8.5 - Fixed issue with installer on latest Kali and Docker builds
  • v8.5 - Fixed custom installer for Arachni
  • v8.5 - Fixed Dockerfile with updated Kali image (CC. @stevemcilwain)
  • v8.4 - Added project "Sc0pe" active/passive vulnerability scanner
  • v8.4 - Added 68 new active sc0pe templates
  • v8.4 - Added 14 new passive sc0pe templates
  • v8.4 - Added OWASP ZAP API integration
  • v8.4 - Added 8 new Sn1per configuration templates (see /usr/share/sniper/conf/)
  • v8.4 - Added Gau (https://github.com/lc/gau)
  • v8.4 - Added rapiddns subdomain retrieval
  • v8.4 - Updated web content wordlists
  • v8.4 - Improved efficiency of 'web' and 'recon' mode scans
  • v8.4 - Disabled legacy Metasploit web exploits (check Sn1per conf to re-enable)
  • v8.4 - Fixed issue with dirsearch asterisk being used incorrectly
  • v8.4 - Fixed issue with airstrike mode not updated Sn1per Professional v8.0 host list
  • v8.4 - Fixed issue with webtech re.error: invalid group reference 1 at position 130
  • v8.3 - Added Github subdomain retrieval (requires API key/conf options enabled)
  • v8.3 - Added NMAP_OPTIONS setting to sniper.conf to configure optional NMap scan settings
  • v8.3 - Added option to specify custom Sn1per configuration via (-c) switch
  • v8.3 - Created several custom config files to select from, including: bug_bounty_quick, bug_bounty_max_javascript, super_stealth_mode, webpwn_only + more
  • v8.3 - Added workspace --export option to backup/export a workspace
  • v8.3 - Added flyover mode tuning options to sniper.conf
  • v8.3 - Added GitGraber automated Github leak search (https://github.com/hisxo/gitGraber)
  • v8.3 - Added static Javascript parsing for sub-domains, URL's, path relative links and comments
  • v8.3 - Added js-beautifier
  • v8.3 - Added LinkFinder Javascript link finder (https://github.com/GerbenJavado/LinkFinder)
  • v8.3 - Added fprobe HTTP probe checker (https://github.com/theblackturtle/fprobe)
  • v8.3 - Added Cisco RV320 and RV325 Unauthenticated Remote Code Execution CVE-2019-1653 MSF exploit
  • v8.3 - Improved performance of 'stealth' and 'recon' modes
  • v8.3 - Updated default port lists
  • v8.3 - Improved performance of all port scans
  • v8.3 - Added fix for missing Amass package
  • v8.3 - Added sniper.conf options for OPENVAS_HOST and OPENVAS_PORT selection for remote instances
  • v8.3 - Improved 'vulnscan' mode via OpenVAS to scan the same asset multiple times with improved error handling
  • v8.2 - Added root priv check to sniper script to run
  • v8.2 - Added NMap port change notifications via Slack
  • v8.2 - Fixed issue with firefox not loading on Kali Linux 2020.1
  • v8.2 - Fixed issue with Masswebscan mode not working
  • v8.2 - Added Rails file exposure exploit CVE-2019-5418
  • v8.2 - Updated wordlist selections to fingerprint common vulnerable applications
  • v8.2 - Added h8mail compromised credentials check to OSINT (-o) mode
  • v8.2 - Added Kali start menu app & icon for Sn1per
  • v8.2 - Added check for insecure SSL/TLS connections
  • v8.2 - Added NMAP_OPTIONS setting in ~/.sniper.conf to configure optional NMap settings
  • v8.2 - Fixed issue with ManageEngine MSF exploit payload
  • v8.2 - Added Spyse sub-domain enumeration tool (https://github.com/zeropwn/spyse.py)
  • v8.2 - Fixed issue with Subjack (open /src/github.com/haccer/subjack/fingerprints.json: no such file or directory)
  • v8.1 - Added Citrix Gateway Arbitary Code Execution CVE-2019-19781 vulnerability detection
  • v8.1 - Added Pulse Secure VPN Arbitrary File Disclosure CVE-2019-11510 exploit
  • v8.1 - Added --data-length=50 for NMap IPS evasion
  • v8.1 - Removed NMap vulscan script due to F+ results
  • v8.1 - Fixed issue with CRT.SH sub-domain retrieval
  • v8.1 - Updated Kali Linux keyring package
  • v8.1 - Fixed "[: ==: unary operator expected" in all code
  • v8.1 - Updated Sn1per Professional autoload settings
  • v8.1 - Updated web brute force wordlists
  • v8.1 - Removed null and debug errors from passive spider API output
  • v8.1 - Updated Commoncrawl index repo
  • v8.1 - Updated DockerFile repository
  • v8.1 - Fixed issue with -dh flag to delete host with Sn1per Pro v8.0
  • v8.1 - Fixed issue with subfinder missing
  • v8.1 - Fixed issue with 7zip missing
  • v8.1 - Added check for Ubuntu to install.sh automatically
  • v8.0 - Added ASnip tool to retrieve ASN's via 'recon' mode
  • v8.0 - Added Shodan sub-domain lookup
  • v8.0 - Added script timeout flag for NMap scripts
  • v8.0 - Fixed issue with dnsenum getting stuck on gathering dns info stage
  • v8.0 - Added option to force upgrade/install.sh without user prompt (ie. ./install.sh force)
  • v8.0 - Fixed issue with theHarvester package on Ubuntu systems
  • v8.0 - Fixed error "[: ==: unary operator expected" in all modes
  • v8.0 - Added net-tools package for Ubuntu OS deps
  • v7.4 - Added LDAP anomyous search to port 389/tcp checks (Shoutout @D0rkerDevil)
  • v7.4 - Added Java RMI dump registry scan checks and exploits to port 8001/tcp (Shoutout @D0rkerDevil)
  • v7.4 - Added CheckPoint Firewall-1 SecuRemote Topology Service Hostname Disclosure MSF module
  • v7.4 - Added virtualhost scanning via web mode
  • v7.4 - Added Gobuster
  • v7.4 - Addd URLCrazy DNS alterations check to OSINT mode
  • v7.4 - Added Ultratools Whois Lookups to OSINT mode
  • v7.4 - Added Email-Format.com Email Retreival to OSINT mode
  • v7.4 - Added Metasploit OSINT email retrieval to OSINT mode
  • v7.4 - Added Hackertarget URL API retrieval to web modes
  • v7.4 - Fixed error in massvulnscan mode
  • v7.4 - Fixed issue with webscreenshot.py not running
  • v7.4 - Added reverse whois DNS search via AMass
  • v7.4 - Added MassDNS IP's to master sorted IP list
  • v7.4 - Fixed issue with MassDNS installation
  • v7.4 - Fixed bad path with DNSGen
  • v7.4 - Fixed issue with AMass not running
  • v7.4 - Improved performance of AltDNS/DNSgen/MassDNS retrieval
  • v7.4 - Changed webscreenshot.py setting to use chrome browser and increased timeout
  • v7.4 - Fixed issue with missing xmlstarlet package for OpenVAS scans
  • v7.4 - Improved active web spider URL consolidation
  • v7.3 - Added CVE-2019-15107 Webmin <= 1.920 - Unauthenticated RCE MSF exploit
  • v7.3 - Added massdns plugin
  • v7.3 - Added altdns plugin
  • v7.3 - Added dnsgen plugin
  • v7.3 - Updated web file/dir wordlists from public exploits and honeypots
  • v7.3 - Added time stamps to all commands
  • v7.3 - Removed CloudFront from domain hijacking checks
  • v7.3 - Removed snmp-brute.nse script due to scan issues
  • v7.3 - Fixed issue with discover scan workspace names
  • v7.3 - Fixed issue with DockerFile (sed: can't read /usr/bin/msfdb: No such file or directory)
  • v7.3 - Fixed issue with installer on docker not having pip installed
  • v7.3 - Fixed issue with port 161 not being referenced correctly in scans
  • v7.2 - Added experimental OpenVAS API integration
  • v7.2 - Improved Burpsuite 2.x API integration with vuln reporting
  • v7.2 - Added hunter.io API integration to recon mode scans
  • v7.2 - Added Cisco IKE Key Disclosure MSF exploit
  • v7.2 - Added JBoss MSF vuln scanner module
  • v7.2 - Added Apache CouchDB RCE MSF exploit
  • v7.2 - Added IBM Tivoli Endpoint Manager POST Query Buffer Overflow exploit
  • v7.2 - Added Java RMI MSF scanner
  • v7.2 - New scan mode "vulnscan"
  • v7.2 - New scan mode "massportscan"
  • v7.2 - New scan mode "massweb"
  • v7.2 - New scan mode "masswebscan"
  • v7.2 - New scan mode "massvulnscan"
  • v7.2 - Added additional Slack API notification settings
  • v7.2 - Improved NMap port detection and scan modes
  • v7.2 - Fixed issue with Censys API being enabled by default
  • v7.2 - Fixed verbose errors in subjack/subover tools
  • v7.2 - Fixed issue with NMap http scripts not working
  • v7.1 - Added BlueKeep CVE-2019-0708 MSF scanner
  • v7.1 - Added automatic workspace generation for single target scans
  • v7.1 - Added new slack.sh API integration script
  • v7.1 - Added differential Slack notifications for new domains, new URL's and various scan outputs
  • v7.1 - Added vulners and vulscan NMap scripts
  • v7.1 - Added installer and support for Debian, Parrot and Ubuntu OS (install_debian.sh) (CC. @imhaxormad)
  • v7.1 - Fixed various issues with the DockerFile
  • v7.1 - Fixed/added Metasploit LHOST/LPORT values to all exploits based on sniper.conf settings
  • v7.1 - Fixed issue with Amass/Golang 1.11 not installing correctly
  • v7.0 - Added "webscan" mode for automated Burpsuite 2.x and Arachni web application scans only
  • v7.0 - Added Slack API notifications (Disabled by default..check ~/.sniper.conf)
  • v7.0 - Added new command switch to add daily, weekly or monthly sniper scheduled scans... check README
  • v7.0 - Added scheduled scan tasks command switch (Needs additional configuration to setup... check README)
  • v7.0 - Added Axis2 authenticated deployer MSF exploit
  • v7.0 - Added Axis2 login brute force module
  • v7.0 - Added subjack tool to check for subdomain hijacking
  • v7.0 - Added sorted IP lists under $LOOT_DIR/ips/ips-all-sorted.txt
  • v7.0 - Added subnet retrieval for all 'recon' mode scans under $LOOT_DIR/nmap/subnets-$TARGET.txt
  • v7.0 - Added Webscreenshot.py and disabled cutycapt from default config
  • v7.0 - Added Gobuster (Disabled by default..check ~/.sniper.conf)
  • v7.0 - Fixed issue with SubOver not working due to bad path
  • v7.0 - Fixed issue with flyover mode running 2x
  • v6.3 - Added Drupal RESET Unserialize RCE CVE-2019-6340
  • v6.2 - Added Glassfish Admin traversal MSF exploit
  • v6.2 - Added ElasticSearch Java Injection MSF RCE exploit
  • v6.2 - Added WebTech web fingerprinting tool
  • v6.2 - Added censys subdomain retrieval and API key config
  • v6.2 - Added project sonar sub-domain retrieval
  • v6.2 - Added command switch to remove workspace (-d)
  • v6.2 - Added command switch to remove host (-dh)
  • v6.2 - Added DockerFile to run Sn1per in Docker (CC. Hariom Vashisth hariom.devops@gmail.com)
  • v6.2 - Changed option to automatically import all NMap XML's into Metasploit's DB
  • v6.2 - Changed option to automatically load Sn1per Professional's report when scans complete
  • v6.2 - Added config option to enable/disable subdomain hijacking checks in sniper.conf
  • v6.2 - Fixed issue with sniper --list command having invalid reference
  • v6.2 - Fixed issue with theharvester not running
  • v6.1 - Added automated web scanning via Burpsuite Pro 2.x API for all 'web' mode scans
  • v6.1 - Added Waybackmachine URL retrieval to all web scans
  • v6.1 - Converted all exploits to Metasploit
  • v6.1 - Added configuration options to set LHOST/LPORT for all Metasploit exploits in sniper.conf
  • v6.1 - Added improved web brute forcing dictionaries for all scan modes
  • v6.1 - Added individual logging for all tools under the loot directory
  • v6.1 - Added new sniper.conf options to enabled/disable all plugins and change settings per user
  • v6.1 - Fixed issue with CMSMap install/usage
  • v6.1 - Fixed issue with WPScan gem dependency missing (public_suffix)
  • v6.1 - Fixed timeout setting in cutycapt
  • v6.1 - Fixed issue with theharvester not running correctly
  • v6.1 - Fixed issue with Amass not running due to invalid command line options in latest release
  • v6.1 - Fixed issue with Sn1per Professional notepad.html missing
  • v6.1 - Cleaned up plugins and install dependencies list
  • v6.0 - Improved scan options for discover mode scans
  • v6.0 - Fixed issue with pip3 dependency package missing
  • v6.0 - Removed iceweasel from install.sh to fix apt error
  • v5.9 - Fixed issue with auto updates not notifying users of updates
  • v5.8 - Fixed issue with subfinder not working due to lack of wordlist switch
  • v5.8 - Fixed missing osint directory/file paths
  • v5.7 - Added libSSH auth bypass scanner CVE-2018-10933
  • v5.7 - Added HTTP PUT method RCE MSF exploit
  • v5.7 - Added sniper.conf scan configuration file to customize sniper environments by user
  • v5.7 - Added modular scan mode source files
  • v5.7 - Updated wordlists for improved performance and results
  • v5.7 - Fixed issue with DNScan using an invalid path
  • v5.6 - Changed automatic report generation to "ON" for Sn1per Pro users
  • v5.5 - Added new multi-threaded high speed "flyover" mode added
  • v5.5 - Added new scan status mode via (sniper --status) command
  • v5.5 - Apache Struts CVE-2018-11776 RCE exploit
  • v5.5 - Added Android Insecure ADB RCE auto exploit
  • v5.5 - Added Apache Tomcat CVE-2017-12617 RCE exploit
  • v5.5 - Added Oracle WebLogic WLS-WSAT Component Deserialisation RCE CVE-2017-10271 MSF exploit
  • v5.5 - Added BlackWidow web application scanner with INJECTX fuzzer
  • v5.5 - Added CVE-2018-15473 SSH user enumeration script
  • v5.5 - Minor wordlist updates for web file brute forcing
  • v5.4 - Updated Golang in install.sh
  • v5.3 - Updated AMass repo in install.sh
  • v5.3 - Removed CloudFail
  • v5.3 - Fixed issue with subfinder missing brute force list
  • v5.3 - Fixed issue with invalid dnsscan reference
  • v5.2 - Added SubOver subdomain takeover scanner
  • v5.2 - Added Subfinder subdomain enumeration tool
  • v5.2 - Added Amass subdomain enumeration tool
  • v5.2 - Added configurable modules/plugins to sniper script
  • v5.2 - Added MS17-010 SMB Etternal Blue MSF exploit
  • v5.2 - Added MSF Postgresql login scanner
  • v5.2 - Added passive web spider
  • v5.2 - Added WebDav metasploit aux modules
  • v5.2 - Added NetBIOS NMap/MSF enumeration
  • v5.2 - Added SMB MSF enumeration
  • v5.2 - Added NSF MSF enumeration
  • v5.2 - Added SSH MSF enumeration
  • v5.2 - Added BadBlue Passthru MSF exploit
  • v5.2 - Added SMB GPP MSF aux module
  • v5.2 - Added Intel AMT MSF scanner
  • v5.2 - Added MySQL MSF scanner
  • v5.2 - Added MS03-026 DCOM RCE MSF exploit
  • v5.2 - Added VNC no auth MSF scanner
  • v5.2 - Added FTP MSF version scanner
  • v5.2 - Added FTP anonymous access MSF scanner
  • v5.2 - Added MS12-020 RDP MSF scanner
  • v5.2 - Added MS10-061 Spoolss MSF exploit
  • v5.2 - Added MS15-034 Sys Memory Dump MSF exploit
  • v5.2 - Added MS06-040 Netapi MSF exploit
  • v5.2 - Added MS05-039 PNP MSF exploit
  • v5.2 - Added MS12-020 Max Channels RDP scanner
  • v5.2 - Added JBoss status MSF scanner
  • v5.2 - Added Apache Struts 2 REST Plugin XStream RCE check
  • v5.2 - Added Apache Tomcat UTF8 Traversal MSF exploit
  • v5.2 - Added Apache OPTIONS Bleed MSF exploit
  • v5.2 - Added HP ILO Auth Bypass MSF exploit
  • v5.2 - Added Jooma Comfields SQL injection MSF exploit
  • v5.1 - Added dnscan to install.sh and updated sniper references which were broken
  • v5.1 - Changed default brute force list for dnscan to improve performance of scans
  • v5.1 - Removed CloudHunter and SubOver references (CC. 爱上平顶山)
  • v5.0 - Added Sn1per Pro reporting interface (see https://sn1persecurity.com for more details)
  • v5.0 - Added GPON Router RCE auto exploit
  • v5.0 - Added Cloudapp.net Azure subdomain takeover check
  • v5.0 - Added Cisco ASA Directory Traversal auto exploit (CVE-2018-0296)
  • v5.0 - Added Wig Web Information Gatherer
  • v5.0 - Added Dirsearch with custom dirsearch wordlists (quick, normal, full)
  • v5.0 - Fixed bug in installer/upgrade which copied the local dir contents to the install dir
  • v5.0 - Improved scan performance while taking web screenshots
  • v5.0 - Fixed repo issue with Slurp (Shoutz to @ifly53e)
  • v5.0 - Fixed issues with wrong ports listed in port scans (Shoutz to @ifly53e)
  • v5.0 - Minor code fixes and typos corrected (Shoutz to @ifly53e)
  • v5.0 - Updated "discover" mode scans for improved performance
  • v4.5 - Added Apache Struts 2 CVE-2017-9805 and CVE-2017-5638 detection
  • v4.5 - Added dirsearch web/file brute forcing
  • v4.5 - Added smart file/directory brute forcing to all scan modes.
  • v4.5 - Added subdomain brute force scan option to Sublist3r scan.
  • v4.4 - Fixed issue with sniper nuke and airstrike modes not running.
  • v4.4 - Added improved SNMP checks via NMap/Metasploit.
  • v4.4 - Resolved dependency issue for nfs-common package.
  • v4.4 - Fixed bug in sniper -fp command switch.
  • v4.3 - Fixed bug in version info.
  • v4.2 - Fixed bad merge in 4.1 causing sniper to break.
  • v4.1 - Fixed a few bugs with various command line switches for airstrike and nuke modes.
  • v4.1 - Fixed issue with path relative file inclusion via the -f flag. You can now include just the local filename (sniper -f targets.txt).
  • v4.0 - Added new command switch options for all sniper scans (see --help for details)
  • v4.0 - Added HTML formatted report for all workspaces to display screenshots, headers, reports and open ports
  • v4.0 - Added optional scan options such as --recon, --osint, --fullportonly --bruteforce, etc. to selectively enable scan modules. (see --help for details)
  • v4.0 - Improved Yasou scan options to include existing NMap XML files
  • v4.0 - Added automatic HTML/TXT/PDF reporting for all scans by default
  • v4.0 - Updated default workspace directory to store all loot files by $TARGET name or $WORKSPACE alias
  • v4.0 - Added screenshot and header retrieval to loot storage
  • v4.0 - Updated NMAP SMB enum script
  • v3.0 - Improved performance of various sniper modes
  • v3.0 - Added Aquatone domain flyover tool
  • v3.0 - Added slurp S3 public AWS scanner
  • v3.0 - Updated Sub-domain hijacking site list
  • v3.0 - Changed look and feel of console output to help readability
  • v3.0 - Added online/offline check to implement changes to scans when in online vs. offline mode
  • v2.9 - New improved fullportonly scan mode
  • v2.9 - Added online check to see if there's an active internet connection
  • v2.9 - Changed default browser to firefox to clear up errors in loot commmand
  • v2.9 - Created uninstall.sh script to uninstall sniper
  • v2.9 - Removed automatic workspace creation per scan
  • v2.9 - Added curl timeout in update command to fix lag
  • v2.9 - Fixed minor NMap UDP scan flag issue
  • v2.9 - Added Metagoofil
  • v2.9 - Updated theharvester scan options to include more results
  • v2.8 - Improved discovery mode scan performance and output
  • v2.8 - Improved fullportonly scan performance
  • v2.8 - Improved startup performance options
  • v2.8 - Added Cansina web/file brute force tool
  • v2.8 - Added webporthttp and webporthttps modes
  • v2.8 - Added custerd software enumeration tool
  • v2.7 - Fixed issue with sniper update command and install.sh not running
  • v2.7 - Fixed errors with GooHak
  • v2.7 - Fixed syntax errors in sniper conditional statements
  • v2.7 - Added CloudFail
  • v2.7 - Fixed issue with [: ==: unary operator expected errors
  • v2.6 - Added Blackarch Linux support
  • v2.6 - Added $BROWSER variable to set default browser
  • v2.5g - Updated README with update command
  • v2.5f - Fixes for various bugs reported and fixed by @ifly53e (1N3#89)
  • v2.5e - Fixed issue with port 3128/tcp checks (CC. @ifly53e)
  • v2.5d - Added searchsploit option for (-v) to search all terms (CC. @ifly53e)
  • v2.5c - Added various improvements to 'discover' mode scans
  • v2.5b - Removed NMap script checks for 'fullportonly' mode
  • v2.5a - Added auto-updates to check and download new versions
  • v2.5a - Fixed issue with install.sh to resolve pip aha error
  • v2.5a - Added libxml2-utils to install.sh to meet dependencies
  • v2.5 - Added HTML report generation via sniper 'loot' command
  • v2.5 - Added automatic NMap searchsploit integration to find exploits
  • v2.5 - Added various improvements to Sn1per discovery scan mode
  • v2.5 - Fixed issue with IIS BoF NMap script (CC. ifly53e)
  • v2.4f - Fixed issue with upper NMap port range(CC. DaveW)
  • v2.4e - Added NMap no ping switch to all scans
  • v2.4d - Fixed issue with rpcinfo install script
  • v2.4d - Fixed issue with Arachni install script
  • v2.4c - Added loot and $TARGET sanity checks (CC. @menzow)
  • v2.4b - Fixed issue with discovery scan output file (CC. @ifly53e)
  • v2.4b - Fixed issue with Intel AMT RCE port list
  • v2.4a - Added all NMap script checks via 'fullportonly' mode
  • v2.4a - Added JBoss JMX Console Beanshell Deployer WAR Upload and Deployment Metasploit exploit
  • v2.4a - Added Java RMI RCE NMap/Metasploit detection
  • v2.4a - Added INTEL-SA-00075 (Intel AMT) vulnerability NMap script
  • v2.4 - Added detection for open X11 servers
  • v2.4 - Added IIS6 Win2k3 RCE NMap script
  • v2.4 - Added option to disable Google Hacking queries via Firefox
  • v2.3d - Fixed issue with loot command
  • v2.3c - Added Apache Struts 2 RCE NMap script
  • v2.3c - Added Apache Struts 2 RCE NMap exploit
  • v2.3b - Changed NMap scan options to exclude ping sweeps (-P0)
  • v2.3a - Fixed minor issue with MSSQL NMap script command (CC. @helo86)
  • v2.3 - Fixed minor issues with missing $TARGET definitions for NMap (CC. @helo86)
  • v2.2f - Added various optimizations and minor code fixes
  • v2.2e - Changed NMap scan options (removed -P0 flag)
  • v2.2d - Added MongoDB checks
  • v2.2d - Improved NMap scanning options
  • v2.2c - Added CouchDB checks
  • v2.2c - Updated Sub-domain takeover list
  • v2.2b - Added fullportonly mode to do exclusive full port scans
  • v2.2b - Fixed minor issue with Metasploit Pro not starting
  • v2.2b - Fixed minor issue with sniper loot command
  • v2.2a - Fixed minor issue with loot function
  • v2.2 - Added auto Metasploit Pro & Zenmap GUI integration
  • v2.2 - Added Sn1per workspaces to loot directory
  • v2.1d - Added crt.sh sub-domain check
  • v2.1d - Removed blank screenshots from loot directory
  • v2.1c - Fixed issue with install.sh install directories
  • v2.1b - Added automatic Metasploit NMap xml imports for loot directory
  • v2.1b - Removed Zenmap
  • v2.1a - Separated Arachni reports for port 80/443/tcp
  • v2.1a - Fixed NMap full port scan options
  • v2.1 - Added Arachni with auto HTML web reporting (web mode only)
  • v2.1 - Added full NMap detailed port scans
  • v2.1 - Added port 4443/tcp checks
  • v2.1 - Added META tag scans for web apps
  • v2.1 - Removed Uniscan from web mode
  • v2.1 - Removed SQLMap from web mode
  • v2.0b - Added help option --help
  • v2.0a - Fixed issue with ssh-audit
  • v2.0a - Fixed issue with 'discover' mode
  • v2.0 - Updated sub-domain takeover list
  • v2.0 - Improved scan performance for stealth, airstrike and discover modes
  • v2.0 - Removed jexboss due to clear screen issue with output
  • v2.0 - Auto loot directory sorting for all tools
  • v2.0 - Updated install.sh package list
  • v1.9c - Enabled BruteX automated brute force attacks
  • v1.9b - Fixed MSSQL port 1433/tcp port scan check (@hacktrack)
  • v1.9a - Removed testssl script from stealth mode scans
  • v1.9 - Added Ubuntu docker image for Sn1per (@menzow)
  • v1.9 - Added automatic loot directory sorting for all modes
  • v1.9 - Added MSSQL port 1433/tcp checks
  • v1.9 - Added SNMP port 162/tcp checks (@hexageek)
  • v1.9 - Added nslookup to install.sh
  • v1.9 - Fixed install.sh dependency duplicates
  • v1.8c - Added -A option to all NMap port scans
  • v1.8c - Fixed install.sh permission issue
  • v1.8c - Fixed install.sh cleanup options
  • v1.8c - Added ssh-audit
  • v1.8c - Added install directory (/usr/share/sniper/) to install script for universal access
  • v1.8c - Fixed issue with Metasploit SSH scans
  • v1.8c - Added auto-update to install.sh to automatically pull latest github release
  • v1.8b - Fixed bug with NMap UDP scan options
  • v1.8b - Fixed install.sh dependencies
  • v1.8b - Fixed jexboss options
  • v1.8a - Updated sub-domain hijack list of domains (CC: th3gundy)
  • v1.8 - Added sub-domain hijack scans for all sub-domains
  • v1.8 - Added auto explort of all sub-domains to /domains directory
  • v1.8 - Added additional stealth and airstrike checks for port 80 and 443
  • v1.8 - Fixed issue with theHarvester not working with google
  • v1.7g - Added email security/spoofing checks
  • v1.7f - Added Zenmap XML auto-imports
  • v1.7f - Added ClamAV RCE Nmap script
  • v1.7e - Fixed minor issue with airstrike and nuke mode
  • v1.7e - Fixed minor issues with discover mode
  • v1.7e - Added minor cosmetic improvements to reports
  • v1.7e - Disabled automatic brute forcing by default
  • v1.7e - Added automatic brute force setting in script vars
  • v1.7d - Added sslyze
  • v1.7d - Added 'discover' mode for full subnet scans
  • v1.7d - Added verbosity to scan tasks to separate sub-tasks better
  • v1.7c - Added plain text reporting
  • v1.7c - Improved loot directory structure and sorting
  • v1.7b - Fixed issue with airstrike mode not scanning correctly
  • v1.7b - Improved passive recon performance
  • v1.7a - Improved NMap http scan performance
  • v1.7a - Removed joomscan due to verbosity issues
  • v1.7 - Added uniscan web vulnerability scanner
  • v1.7 - Added joomscan Joomla scanner
  • v1.7 - Improved web scan performance
  • v1.7 - Fixed issue with inurlbr output
  • v1.7 - Added remote desktop viewing for RDP connections
  • v1.7 - Added experimental Metasploit exploit for Apache Struts RCE (CVE-2016-3081)
  • v1.6e - Added reporting option for nobrute mode (CC. @mero01)
  • v1.6e - Improved SMB scan performance/optimization added
  • v1.6d - Improved NMap scan performance options
  • v1.6d - Added xprobe2 OS finger printing tool
  • v1.6d - Added jexbos JBoss autopwn
  • v1.6d - Merged fix for theharvester package (CC. @RubenRocha)
  • v1.6d - Merged fix for SuperMicroScanner (CC. @mero01)
  • v1.6c - Add report mode for web scans
  • v1.6c - Fixed issues with Sublist3r and theharvester
  • v1.6c - Added Shocker Shellshock exploitation scanner
  • v1.6b - Added Sublist3r sub-domain brute tool
  • v1.6b - Added cutycapt web screenshot util
  • v1.6a - Added improvements to recon phase
  • v1.6a - Fixed small issue with 3rd party extension
  • v1.6a - Various improvements to overall optimization of scans
  • v1.6a - Added new "web" mode for full web application scans
  • v1.6 - Added 4 new modes including: stealth, port, airstrike and nuke
  • v1.6 - Added Java de-serialization scanner
  • v1.6 - Added reporting option to output to console and text file for all scans
  • v1.6 - Added option to set Sn1per full path for universal command line access
  • v1.6 - Added in DirBuster for web file brute forcing
  • v1.6 - Fixed issue with sderr errors in TheHarvester
  • v1.5e - Removed shodan command line tool due to issues
  • v1.5e - Fixed wafwoof installation in kali 2.0
  • v1.5d - Fixed minor issues with port 513/tmp and 514/tcp checks
  • v1.5c - Fixed issue which broke link to sniper directory
  • v1.5b - Added Squid Proxy checks port 3128/tcp
  • v1.5b - Fixed shodan setup options in install.sh
  • v1.5b - Fixed syntax error with theHarvester in install.sh
  • v1.5a - Fixed syntax error with port 8081 checks
  • v1.5a - Added Arachni integration
  • v1.5a - Added vsftpd, proftpd, mysql, unrealircd auto exploits
  • v1.5 - Added Metasploit scan and auto-exploit modules
  • v1.5 - Added additional port checks
  • v1.5 - Added full TCP/UDP NMap XML output
  • v1.5 - Auto tune scan for either IP or hostname/domain
  • v1.4h - Added auto IP/domain name scan configurations
  • v1.4g - Added finger enumeration scripts
  • v1.4g - Fixed nmap -p 445 target issue
  • v1.4g - Fixed smtp-enum target issue
  • v1.4f - Fixed BruteX directory bug
  • v1.4e - Fixed reported errors install.sh
  • v1.4e - Added auto-upgrade option to install.sh for existing Sn1per installs
  • v1.4d - Fixed missing rake gem install dependency
  • v1.4c - Reordered 3rd party extensions
  • v1.4b - Fixed install.sh executable references
  • v1.4b - Fixed Yasou dependencies in install.sh
  • v1.4b - Fixed minor issues with BruteX loot directory
  • v1.4 - Added Yasou for automatic web form brute forcing
  • v1.4 - Added MassBleed for SSL vulnerability detection
  • v1.4 - Added Breach-Miner for detection of breached accounts
  • v1.4 - Fixed minor errors with nmap
  • v1.4 - Removed debug output from goohak from displaying on console