⠀⠀⠀⠀⠀⠀⠶⡶⣶⣾⣷⣶⢶⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣿⣿⣿⣿⣷⣶⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣉⣉⣙⣉⡉⠉⠉⠉⠉⠉⠛⠉ ⠿⠿⠿⠛⠻⠿⢶⣿⠉⠈⠛⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀███████╗██╗ ██╗██████╗ ██╗ ██████╗ ██╗████████╗ ██╔════╝╚██╗██╔╝██╔══██╗██║ ██╔═══██╗██║╚══██╔══╝ █████╗ ╚███╔╝ ██████╔╝██║ ██║ ██║██║ ██║ ██╔══╝ ██╔██╗ ██╔═══╝ ██║ ██║ ██║██║ ██║ ███████╗██╔╝ ██╗██║ ███████╗╚██████╔╝██║ ██║ ╚══════╝╚═╝ ╚═╝╚═╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ██████╗ ███╗ ██╗██╗██████╗ ███████╗██████╗ ██╔════╝████╗ ██║██║██╔══██╗██╔════╝██╔══██╗ ███████╗██╔██╗ ██║██║██████╔╝█████╗ ██████╔╝ ╚════██║██║╚██╗██║██║██╔═══╝ ██╔══╝ ██╔══██╗ ███████║██║ ╚████║██║██║ ███████╗██║ ██║ ╚══════╝╚═╝ ╚═══╝╚═╝╚═╝ ╚══════╝╚═╝ ╚═╝
Fast. Powerful. Animated.
An advanced CLI web security scanner built for bug hunters.
12 scan modules | 600+ payloads | Concurrent execution | Live findings output
git clone https://github.com/Ibrahim-dad/Exploit-Sniper.git
cd Exploit-Sniper
npm install
npm run build
sudo npm linkNow run from anywhere:
exploit-sniper full -t https://target.comNote: Use
sudo npm linkon Linux/macOS. On Windows, run your terminal as Administrator.
- 12 Security Scan Modules — XSS, SQLi, LFI, SSRF, IDOR, CORS, Open Redirect, Security Headers, Directory Bruteforce, API Discovery, User Enumeration, Rate Limit Testing
- 600+ Attack Payloads — Curated and categorized payloads across all injection types
- Concurrent Execution — Configurable thread count per module for blazing-fast scans
- Live Finding Output — Findings print in real-time as they're discovered with severity ratings
- Animated CLI — Sniper ASCII art banner, typewriter title effect, spinners on every module
- JSON Reports — Export structured scan reports for every module or full scan
- Deep Scan Mode — Unleash the full payload arsenal for thorough assessments
- Zero External Dependencies for HTTP — Uses Node.js native
fetch— no axios needed
| Module | Command | Description | Payloads |
|---|---|---|---|
| XSS | xss |
Cross-Site Scripting — 8 categories including DOM-based, polyglot, WAF bypass | 150+ |
| SQLi | sqli |
SQL Injection — union, boolean, time-based blind, stacked queries | 200+ |
| LFI | lfi |
Local File Inclusion / Path Traversal — encoded, null byte, filter bypass | 100+ |
| Open Redirect | redirect |
Open Redirect — protocol-relative, data URI, encoding tricks | 50+ |
| SSRF | ssrf |
Server-Side Request Forgery — localhost, cloud metadata, internal services | 70+ |
| CORS | cors |
CORS Misconfiguration — wildcard, origin reflection, null origin, preflight | — |
| Headers | headers |
Security Headers & Info Disclosure — 10 headers, cookies, HTTP methods, stack traces | — |
| IDOR | idor |
Insecure Direct Object Reference — 27 API patterns, ID probing, method tampering | — |
| Dirs | dirs |
Directory & File Bruteforce — admin panels, backups, configs, sensitive files | 250+ |
| API | api |
API Endpoint Discovery — REST patterns, auth checks, version enumeration | — |
| Users | users |
User Enumeration — login, register, password reset timing & response analysis | — |
| Rate Limit | ratelimit |
Rate Limit Testing — burst requests against auth endpoints | — |
# Full scan — run all 12 modules
exploit-sniper full -t https://target.com
# Deep scan — unleash all 600+ payloads
exploit-sniper full -t https://target.com --deep
# Save JSON report
exploit-sniper full -t https://target.com -o report.json
# Skip specific modules
exploit-sniper full -t https://target.com --skip users ratelimit
# Crank up the threads
exploit-sniper full -t https://target.com --threads 50exploit-sniper xss -t https://target.com -p search q
exploit-sniper xss -t https://target.com --deep -c polyglot waf_bypassCategories: basic, eventHandlers, encodingBypass, filterEvasion, domBased, polyglot, waf_bypass, template_injection
exploit-sniper sqli -t https://target.com -p id username
exploit-sniper sqli -t https://target.com --deep --time-based --time-threshold 5000Categories: union, boolean, error_based, stacked, time_based, comment, auth_bypass, nosql, order_by, insert_update
exploit-sniper lfi -t https://target.com?file=test -p file
exploit-sniper lfi -t https://target.com --deepCategories: basic, encoded, null_byte, filter_bypass, windows, interesting_files, wrapper
exploit-sniper redirect -t https://target.com?next= -p next url redirectexploit-sniper ssrf -t https://target.com?url= -p url callback webhookexploit-sniper cors -t https://target.comexploit-sniper headers -t https://target.comexploit-sniper idor -t https://target.comexploit-sniper dirs -t https://target.com -e php html asp
exploit-sniper dirs -t https://target.com --sensitive --threads 50exploit-sniper api -t https://target.com
exploit-sniper api -t https://target.com --no-auth-checkexploit-sniper users -t https://target.com
exploit-sniper users -t https://target.com --login-path /api/login -u admin root testexploit-sniper ratelimit -t https://target.com -n 100
exploit-sniper ratelimit -t https://target.com --paths /api/login /api/reset| Option | Description | Default |
|---|---|---|
-t, --target <url> |
Target URL (required) | — |
-v, --verbose |
Show detailed output | false |
-o, --output <file> |
Save report as JSON | — |
--threads <n> |
Concurrent requests | Varies per module |
--deep |
Use ALL payloads (slower, thorough) | false |
| Module | Default Threads |
|---|---|
| XSS, SQLi, LFI, Redirect | 15 |
| SSRF, IDOR | 10 |
| Dirs | 25 |
| Full Scan | 20 |
exploit-sniper payloads # List all payload categories
exploit-sniper help-all # Complete command reference with examples
exploit-sniper --help # Quick helpFindings appear in real-time during scans with severity color coding:
⚡ FINDING [CRITICAL] CORS: Wildcard Access-Control-Allow-Origin
⚡ FINDING [HIGH] XSS: Reflected payload in response — <script>alert(1)</script>
⚡ FINDING [MEDIUM] Missing Header: X-Content-Type-Options
⚡ FINDING [LOW] Info Disclosure: Server header exposes version
| Level | Color | Description |
|---|---|---|
| CRITICAL | Red | Immediate exploitation risk |
| HIGH | Orange | Significant vulnerability |
| MEDIUM | Yellow | Moderate security concern |
| LOW | Blue | Minor issue or informational |
| INFO | Gray | Informational finding |
{
"target": "https://target.com",
"scanType": "full",
"timestamp": "2026-03-27T00:00:00.000Z",
"summary": {
"total": 42,
"critical": 3,
"high": 8,
"medium": 15,
"low": 10,
"info": 6
},
"findings": [
{
"module": "cors",
"severity": "critical",
"title": "Wildcard Access-Control-Allow-Origin",
"detail": "..."
}
]
}exploit-sniper/
├── src/
│ ├── cli.ts # Main CLI entry — 14 commands
│ ├── scanners/
│ │ ├── full-scan.ts # Orchestrates all 12 modules
│ │ ├── xss.ts # XSS scanner
│ │ ├── sqli.ts # SQL Injection scanner
│ │ ├── lfi.ts # LFI / Path Traversal scanner
│ │ ├── open-redirect.ts # Open Redirect scanner
│ │ ├── ssrf.ts # SSRF scanner
│ │ ├── cors.ts # CORS misconfiguration scanner
│ │ ├── headers.ts # Security headers scanner
│ │ ├── idor.ts # IDOR scanner
│ │ ├── directory.ts # Directory bruteforce scanner
│ │ ├── api-checker.ts # API endpoint discovery
│ │ ├── user-enum.ts # User enumeration scanner
│ │ └── rate-limit.ts # Rate limit tester
│ ├── payloads/
│ │ ├── xss-payloads.ts # 150+ XSS payloads (8 categories)
│ │ ├── sqli-payloads.ts # 200+ SQLi payloads (10 categories)
│ │ ├── lfi-payloads.ts # 100+ LFI payloads (7 categories)
│ │ ├── ssrf-payloads.ts # 70+ SSRF payloads
│ │ ├── redirect-payloads.ts# 50+ Open Redirect payloads
│ │ └── directories.ts # 250+ directory/file paths
│ └── utils/
│ ├── http.ts # HTTP client with runConcurrentWithCallback()
│ └── reporter.ts # Animated banner, Spinner, printLiveFind, reports
├── package.json
├── tsconfig.json
├── build.mjs
└── README.md
| Component | Technology |
|---|---|
| Language | TypeScript 5.x |
| Runtime | Node.js >= 18 |
| HTTP | Native fetch API (no axios) |
| CLI Framework | Commander.js |
| Terminal Output | Chalk, cli-table3, cli-progress |
| Concurrency | Custom runConcurrentWithCallback() with configurable thread pools |
| Build | esbuild |
⚠ IMPORTANT: Only use Exploit-$niper on targets you have explicit authorization to test.
Unauthorized scanning of systems you do not own or have permission to test is illegal
and unethical. The authors are not responsible for any misuse of this tool.
This tool is intended for:
- Authorized penetration testing
- Bug bounty programs
- Security research on your own systems
- Educational purposes
MIT
Built for bug hunters, by bug hunters.
[ Exploit-$niper ] — Precision Strike Web Security Scanner