Overview
Sn1per is an automated reconnaissance scanner that can be used to discover assets and scan for vulnerabilities using the latest open source tools and techniques. For our Professional and Enterprise versions of Sn1per, which includes a full featured web UI, go to https://sn1persecurity.com
All-In-One Solution Save time and money by addressing business and IT risk with a single solution.
Attack Surface Management Discover the attack surface and prioritize risk with our continuous Attack Surface Management platform.
Automated OSINT & Reconnaissance Automate the collection of open source intelligence data using our integrations with 3rd party API's, frameworks and automated workflows to get the data you need.
Penetration Testing Save time by automating the execution of the best open source and commercial security tools to discover and exploit vulnerabilities automatically.
Automated Red Team Simulation Simulate real world attackers with our automated attack platform in order to strengthen blue team response and defensive controls.
Vulnerability & Risk Management Integrate with the leading commercial and open source vulnerability scanners to scan for the latest vulnerabilities and prioritize risk with our aggregated vulnerability reports.
Dynamic Application Security Testing Scan your web applications for vulnerabilities and aggregate data from multiple open source and commercial security scanners into our centralized reporting interface.
Threat Intelligence Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases.
Bug Bounty Automation Get the tools you need to manage large attack surfaces and gain the edge over the competition.
Features
Quick Installation Get up and running with our platform in minutes with our quick and easy one-line installation script.
Safe Execution Get full control over your scans by setting the the scope and configuration options to ensure safe execution in your environment.
Full Attack Surface Coverage Discover both internal (on-prem) and external (cloud/hybrid) attack vectors for full asset visibility and vulnerability coverage.
Vulnerability Scanning Scan for the latest CVE's and vulnerabilities using the latest open source and commercial vulnerability scanners.
Integrations Aggregate data from the leading security tools, API's and 3rd party services into our centralized reporting interface.
Continuous Scan Coverage Schedule scans on a daily, weekly or monthly basis to identify changes in your attack surface and remediate new vulnerabilities as they appear.
Notifications & Changes Receive notifications for changes in your environment, such as: new domains, new URLs, port changes and more.
IT Asset Inventory Build a centralized repository of your company's assets that can be easily searched, sorted and filtered to provide full visibility into your attack surface.
Attack Surface Reports Export your entire attack surface inventory (ie. sub-domains, DNS, open ports, HTTP headers, risk score, etc.) to CSV, XLS or PDF format.
Vulnerability Reports Export vulnerability reports in CSV, XLS or PDF format for your entire attack surface.
Highlights
- Discover hidden assets
- Identify critical vulnerabilities
- Continuous scan coverage
Details
Typical total price
$0.012/hour
Pricing
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t2.nano | $0.00 | $0.006 | $0.006 |
t2.micro AWS Free Tier Recommended | $0.00 | $0.012 | $0.012 |
t2.small | $0.00 | $0.023 | $0.023 |
t2.medium | $0.00 | $0.046 | $0.046 |
t2.large | $0.00 | $0.093 | $0.093 |
t2.xlarge | $0.00 | $0.186 | $0.186 |
t2.2xlarge | $0.00 | $0.371 | $0.371 |
t3.nano | $0.00 | $0.005 | $0.005 |
t3.micro AWS Free Tier | $0.00 | $0.01 | $0.01 |
t3.small | $0.00 | $0.021 | $0.021 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp2) volumes | $0.10/per GB/month of provisioned storage |
Vendor refund policy
This is a free software product, so no refunds will be accepted.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
USAGE:
- Install the Sn1per Community Edition AMI from the AWS marketplace
- Add your SSH key-pair to the newly created instance
- SSH into your instance with the 'kali' username and your SSH key
- Run, 'sudo sniper -h' for help getting started
Resources
Vendor resources
Support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.