Sign in
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Sn1per Community Edition

By: Sn1perSecurity Latest Version: 9.0

Product Overview

Sn1per is an automated reconnaissance scanner that can be used to discover assets and scan for vulnerabilities using the latest open source tools and techniques. For our Professional and Enterprise versions of Sn1per, which includes a full featured web UI, go to

All-In-One Solution
Save time and money by addressing business and IT risk with a single solution.

Attack Surface Management
Discover the attack surface and prioritize risk with our continuous Attack Surface Management platform.

Automated OSINT & Reconnaissance
Automate the collection of open source intelligence data using our integrations with 3rd party API's, frameworks and automated workflows to get the data you need.

Penetration Testing
Save time by automating the execution of the best open source and commercial security tools to discover and exploit vulnerabilities automatically.

Automated Red Team Simulation
Simulate real world attackers with our automated attack platform in order to strengthen blue team response and defensive controls.

Vulnerability & Risk Management
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest vulnerabilities and prioritize risk with our aggregated vulnerability

Dynamic Application Security Testing
Scan your web applications for vulnerabilities and aggregate data from multiple open source and commercial security scanners into our centralized reporting interface.

Threat Intelligence
Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases.

Bug Bounty Automation
Get the tools you need to manage large attack surfaces and gain the edge over the competition.


Quick Installation
Get up and running with our platform in minutes with our quick and easy one-line installation script.

Safe Execution
Get full control over your scans by setting the the scope and configuration options to ensure safe execution in your environment.

Full Attack Surface Coverage
Discover both internal (on-prem) and external (cloud/hybrid) attack vectors for full asset visibility and vulnerability coverage.

Vulnerability Scanning
Scan for the latest CVE's and vulnerabilities using the latest open source and commercial vulnerability scanners.

Aggregate data from the leading security tools, API's and 3rd party services into our centralized reporting interface.

Continuous Scan Coverage
Schedule scans on a daily, weekly or monthly basis to identify changes in your attack surface and remediate new vulnerabilities as they appear.

Notifications & Changes
Receive notifications for changes in your environment, such as: new domains, new URLs, port changes and more.

IT Asset Inventory
Build a centralized repository of your company's assets that can be easily searched, sorted and filtered to provide full visibility into your attack surface.

Attack Surface Reports
Export your entire attack surface inventory (ie. sub-domains, DNS, open ports, HTTP headers, risk score, etc.) to CSV, XLS or PDF format.

Vulnerability Reports
Export vulnerability reports in CSV, XLS or PDF format for your entire attack surface.



Operating System

Linux/Unix, Debian Kali Linux 2022.2

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews