Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit b0c5280

Browse files
authored
Merge branch 'master' into 416-Feat]-Separate-Docker-Compose-files
2 parents 6e4382a + bdb35d8 commit b0c5280

27 files changed

+147
-59
lines changed

CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
## CHANGELOG:
2+
* v9.2 - Fixed issue with gau tool not installing and updated GAU setting in confs
3+
* v9.2 - Updated python2 to python3
4+
* v9.2 - Removed Slurp tool
5+
* v9.2 - Added BlackArch Dockerfile
6+
* v9.2 - Updated DockerFile to latest Kali release
27
* v9.1 - Fixed issue with dirsearch installation/command syntax update
38
* v9.1 - Updated Nuclei sc0pe templates
49
* v9.1 - Fixed issue with Nuclei sc0pe parsers not working

README.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@
99

1010
[[Website](https://sn1persecurity.com/wordpress/)] [[Blog](https://sn1persecurity.com/wordpress/blog/)] [[Shop](https://sn1persecurity.com/wordpress/shop)] [[Documentation](https://sn1persecurity.com/wordpress/documentation/)] [[Demo](https://www.youtube.com/c/Sn1perSecurity/videos)] [[Find Out More](https://sn1persecurity.com/wordpress/external-attack-surface-management-with-sn1per/)]
1111

12-
## Attack Surface Management
12+
13+
## Attack Surface Management Platform
1314

1415
### Discover hidden assets and vulnerabilities in your environment
1516

@@ -47,16 +48,16 @@ Sn1per is a next-generation information gathering tool that provides automated,
4748

4849
### News
4950

51+
- #### [Automated Penetration Testing Guide - Your Ultimate Resource](https://sn1persecurity.com/wordpress/penetration-testing-guide/)
52+
- #### [Sn1per Enterprise v20230516 Released!](https://sn1persecurity.com/wordpress/sn1per-enterprise-v20230516-released/)
53+
- #### [Dark Web Monitoring: Securing Your External Attack Surface](https://sn1persecurity.com/wordpress/dark-web-monitoring-securing-your-external-attack-surface/)
54+
- #### [Sn1per Scan Engine v10.4 Released!](https://sn1persecurity.com/wordpress/sn1per-scan-engine-v10-4-released/)
55+
- #### [Sn1per: The Next Generation of Tools for Security Professionals](https://sn1persecurity.com/wordpress/sn1per-the-next-generation-of-tools-for-security-professionals/)
5056
- #### [Sn1per Scan Engine v10.3 Released!](https://sn1persecurity.com/wordpress/sn1per-scan-engine-v10-3-released/)
51-
5257
- #### [5 Ways Sn1per Can Automate Your Security Workflow](https://sn1persecurity.com/wordpress/5-ways-sn1per-can-automate-your-security-workflow/)
53-
5458
- #### [External Attack Surface Management with Sn1per](https://sn1persecurity.com/wordpress/external-attack-surface-management-with-sn1per/)
55-
5659
- #### [Sn1per Scan Engine v10.2 Released!](https://sn1persecurity.com/wordpress/sn1per-scan-engine-v10-2-update/)
57-
5860
- #### [Sn1per Enterprise Released!](https://sn1persecurity.com/wordpress/sn1per-enterprise-released/)
59-
6061
- #### [Sn1per Professional v10.0 Released!](https://sn1persecurity.com/wordpress/sn1per-professional-v10-released/)
6162

6263
## Kali/Ubuntu/Debian/Parrot Linux Install
@@ -253,4 +254,4 @@ For license and legal information, refer to the LICENSE.md (<https://github.com/
253254
254255
To obtain a Sn1per Professional license, go to <https://sn1persecurity.com>.
255256
256-
Attack Surface Management (ASM) | Continuous Attack Surface Testing (CAST) | Attack Surface Software | Attack Surface Platform | Continuous Automated Red Teaming (CART) | Vulnerability & Attack Surface Management | Red Team | Threat Intel | Application Security | Cybersecurity | IT Asset Discovery | Automated Penetration Testing | Hacking Tools | Recon Tool | Bug Bounty Tool | Vulnerability Scanner | Attack Surface Analysis | Attack Surface Reduction | Attack Surface Detector | Attack Surface Monitoring | Attack Surface Review | Attack Surface Discovery | Digital Threat Management | Risk Assessment | Threat Remediation | Offensive Security Framework | Automated Penetration Testing Framework | External Threat Management | Internal IT Asset Discovery | Security Orchestration and Automation (SOAR) | Sn1per tutorial | Sn1per tool | Sn1per metasploit | Sn1per for windows | Sn1per review | Sn1per download | how to use Sn1per | Sn1per professional download | Sn1per professional crack | automated pentesting framework | pentest-tools github | ad pentest tools | pentest-tools review | security testing tools | ubuntu pentesting tools | pentesting tools for mac | cloud-based pen-testing tools
257+
External attack surface management, Attack surface monitoring, Attack Surface Management Platform, Attack Surface Management Solutions, Vulnerability management, Threat intelligence, Cybersecurity risk assessment, Security posture assessment, Digital footprint analysis, Attack surface mapping, Web application security, Network security, Infrastructure security, Cloud security, Third-party risk management, Incident response, Penetration testing, Asset discovery, Patch management, Security scanning, Firewall configuration, Intrusion detection system, Security awareness training, Data breach prevention, Web server security, Endpoint security, Phishing protection, Vulnerability assessment, Network security, Web application testing, Ethical hacking, Security assessment, Information security, Red teaming, Cybersecurity testing, Pen testing tools, Exploitation techniques, Wireless network testing, Social engineering, Security auditing, Incident response, Intrusion detection, Firewall testing, Security assessment methodology, Risk assessment, Security controls, Web vulnerability scanning, Password cracking, Security testing services, Security architecture, System hardening, Network reconnaissance, Red teaming, Penetration testing, Cybersecurity, Vulnerability assessment, Attack simulation, Threat intelligence, Risk assessment, Security testing, Adversarial tactics, Incident response, Security assessment, Network security, Defensive measures, Security controls, Social engineering, Exploitation techniques, Security awareness, Defensive strategies, Risk mitigation, Blue teaming, Security operations, Intrusion detection, Security frameworks, Cyber defense, Information security

bin/slurp.zip

-7.98 MB
Binary file not shown.

conf/bug_bounty_full_brute

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -138,6 +142,7 @@ INURLBR="1"
138142
THEHARVESTER="0"
139143
METAGOOFIL="0"
140144
HUNTERIO="0"
145+
TOMBAIO="0"
141146
INTODNS="0"
142147
EMAILFORMAT="0"
143148
ULTRATOOLS="0"
@@ -178,7 +183,7 @@ WAYBACKMACHINE="1"
178183
SSL="0"
179184
PASSIVE_SPIDER="1"
180185
HACKERTARGET="1"
181-
GUA="1"
186+
GAU="1"
182187
CUTYCAPT="0"
183188
WEBSCREENSHOT="1"
184189

conf/bug_bounty_max_javascript_files

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -138,6 +142,7 @@ INURLBR="1"
138142
THEHARVESTER="0"
139143
METAGOOFIL="0"
140144
HUNTERIO="0"
145+
TOMBAIO="0"
141146
INTODNS="0"
142147
EMAILFORMAT="0"
143148
ULTRATOOLS="0"
@@ -178,7 +183,7 @@ WAYBACKMACHINE="1"
178183
SSL="0"
179184
PASSIVE_SPIDER="1"
180185
HACKERTARGET="1"
181-
GUA="1"
186+
GAU="1"
182187
CUTYCAPT="0"
183188
WEBSCREENSHOT="1"
184189

conf/bug_bounty_quick

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -138,6 +142,7 @@ INURLBR="1"
138142
THEHARVESTER="0"
139143
METAGOOFIL="0"
140144
HUNTERIO="0"
145+
TOMBAIO="0"
141146
INTODNS="0"
142147
EMAILFORMAT="0"
143148
ULTRATOOLS="0"
@@ -178,7 +183,7 @@ WAYBACKMACHINE="1"
178183
SSL="0"
179184
PASSIVE_SPIDER="1"
180185
HACKERTARGET="1"
181-
GUA="1"
186+
GAU="1"
182187
CUTYCAPT="0"
183188
WEBSCREENSHOT="1"
184189

conf/bug_bounty_quick_port_80_443_only

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -138,6 +142,7 @@ INURLBR="1"
138142
THEHARVESTER="0"
139143
METAGOOFIL="0"
140144
HUNTERIO="0"
145+
TOMBAIO="0"
141146
INTODNS="0"
142147
EMAILFORMAT="0"
143148
ULTRATOOLS="0"
@@ -178,7 +183,7 @@ WAYBACKMACHINE="1"
178183
SSL="0"
179184
PASSIVE_SPIDER="1"
180185
HACKERTARGET="1"
181-
GUA="1"
186+
GAU="1"
182187
CUTYCAPT="0"
183188
WEBSCREENSHOT="1"
184189

conf/deep_active_recon

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -142,6 +146,7 @@ INURLBR="1"
142146
THEHARVESTER="1"
143147
METAGOOFIL="1"
144148
HUNTERIO="1"
149+
TOMBAIO="1"
145150
INTODNS="1"
146151
EMAILFORMAT="1"
147152
ULTRATOOLS="1"
@@ -182,7 +187,7 @@ WAYBACKMACHINE="1"
182187
SSL="1"
183188
PASSIVE_SPIDER="1"
184189
HACKERTARGET="1"
185-
GUA="1"
190+
GAU="1"
186191
CUTYCAPT="0"
187192
WEBSCREENSHOT="1"
188193

conf/default

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,10 @@ CENSYS_API_SECRET=""
6464
# HUNTER.IO API KEY
6565
HUNTERIO_KEY=""
6666

67+
# TOMBA.IO API
68+
TOMBAIO_KEY=""
69+
TOMBAIO_SECRET=""
70+
6771
# GITHUB API KEY
6872
GITHUB_API_KEY=""
6973

@@ -168,6 +172,7 @@ INURLBR="1"
168172
THEHARVESTER="1"
169173
METAGOOFIL="1"
170174
HUNTERIO="0"
175+
TOMBAIO="0"
171176
INTODNS="1"
172177
EMAILFORMAT="1"
173178
ULTRATOOLS="1"
@@ -180,7 +185,7 @@ URLSCANIO="1"
180185
# DYNAMIC APPLICATION SCANNERS
181186
BURP_SCAN="0"
182187
ARACHNI_SCAN="0"
183-
ZAP_SCAN="0"
188+
ZAP_SCAN="1"
184189

185190
# ACTIVE WEB PLUGINS
186191
SC0PE_VULNERABLITY_SCANNER="1"
@@ -206,7 +211,7 @@ SMUGGLER="1"
206211
WAYBACKMACHINE="1"
207212
SSL="1"
208213
PASSIVE_SPIDER="1"
209-
GUA="1"
214+
GAU="1"
210215
HACKERTARGET="1"
211216
CUTYCAPT="0"
212217
WEBSCREENSHOT="1"

conf/fast_service_portscan

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,10 @@ CENSYS_API_SECRET=""
5555
# HUNTER.IO API KEY
5656
HUNTERIO_KEY=""
5757

58+
# TOMBA.IO API
59+
TOMBAIO_KEY=""
60+
TOMBAIO_SECRET=""
61+
5862
# GITHUB API KEY
5963
GITHUB_API_KEY=""
6064

@@ -142,6 +146,7 @@ INURLBR="1"
142146
THEHARVESTER="1"
143147
METAGOOFIL="1"
144148
HUNTERIO="1"
149+
TOMBAIO="1"
145150
INTODNS="1"
146151
EMAILFORMAT="1"
147152
ULTRATOOLS="1"
@@ -181,7 +186,7 @@ WAYBACKMACHINE="1"
181186
SSL="1"
182187
PASSIVE_SPIDER="1"
183188
HACKERTARGET="1"
184-
GUA="1"
189+
GAU="1"
185190
CUTYCAPT="0"
186191
WEBSCREENSHOT="1"
187192

0 commit comments

Comments
 (0)