Attack Surface Management Platform
Watch on YouTube @beyondcloudtechnologyChoose the right scan mode based on what you're trying to discover. Each mode is designed for different situations.
NormalWebScanStealthFlyoverNukeBest for: General-purpose scanning when you don't know what to expect
Performs port scanning, service detection, basic web checks, and vulnerability scanning. Good balance of speed and coverage.
Best for: When you need to avoid detection or minimize network noise
Uses slower, quieter techniques. Avoids aggressive scanning that could trigger alerts. Takes longer but less likely to be noticed.
Best for: Targets you know are websites (ports 80 and 443 only)
Focuses only on web services. Fast because it skips non-web ports. Captures screenshots, checks technologies, and finds common web issues.
Best for: Deep web application security testing
Thorough web app analysis including directory brute-forcing, vulnerability scanning with Nikto/Nuclei, CMS detection, and more. Takes longer but finds more issues.
Best for: Services running on non-standard ports (e.g., web server on port 8080)
Enter the specific port number when using these modes. Use WebPortHTTP for HTTP services or WebPortHTTPS for HTTPS services on custom ports.
Best for: Finding services hidden on unusual ports
Scans all 65,535 ports. Very thorough but takes significantly longer. Use when you suspect services are running on non-standard ports.
Best for: Quick reconnaissance of many targets
Fast overview of multiple targets. Perfect for initial scoping to identify which targets need deeper investigation.
Best for: Fast enumeration across many targets
More thorough than Flyover but still optimized for speed. Good for medium-depth scanning of a target list.
Best for: Complete security audit of multiple targets
⚠️ Aggressive mode. Runs everything - all scans, all checks, maximum coverage. Very thorough but time-consuming and noisy.
Best for: Running specific scan types across many targets
Specialized bulk scanning. MassWeb for web detection, MassWebScan for deep web analysis, MassVulnScan for vulnerability scanning, MassPortScan for port discovery.
Best for: Network/CIDR range scanning (e.g., 192.168.1.0/24)
Use to find live hosts on a network. Enter a network range instead of a single target to discover all active devices.
Searches public sources (Shodan, Censys, etc.) for information about your target. Finds exposed services, historical data, and leaked information.
Discovers subdomains and DNS information. Essential for finding all assets associated with a domain (e.g., mail.example.com, dev.example.com).
Attempts to find hidden directories and login pages. Also tries common password attacks on discovered services. ⚠️ Can be noisy.
Scans all 65,535 ports instead of just common ones. Takes much longer but finds services running on unusual ports.
Loading workspaces...
Install Directory: /usr/share/sniper
Loot Directory: /usr/share/sniper/loot/workspace
⚠️ SECURITY WARNING
This utility runs with ROOT privileges. Do NOT expose this interface directly to the internet.
Use a VPN or SSH tunnel (e.g. localhost:8888) for access.