Skip to content

Installation

6 min read Updated April 18, 2026 Sn1per Pro 2026
Documentation/Installation

Sn1per Professional 2026 installs in two modes: bare metal on a supported Linux host, or inside a Docker container. The same activation.sh URL (sent in your order confirmation email) drives both.

System Requirements

Requirement Minimum Recommended
Operating system Kali Linux Rolling, Ubuntu 22.04+, Debian 12+, or Parrot OS Kali Rolling
Architecture x86_64 (64-bit) x86_64
CPU 2 cores 4+ cores
Memory 4 GB 8 GB
Disk space 20 GB 50 GB+ (for scan loot and reports)
Network Outbound HTTPS to sn1persecurity.com Same
Privileges Root or passwordless sudo Root
Inbound port TCP 1337 (HTTPS, self-signed) Same

The installer automatically deploys the following stack:

  • Apache 2.4 with libapache2-mod-php8.4, SSL, and Digest authentication
  • PHP 8.4 (CLI + Apache module) with common extensions
  • PostgreSQL (for Metasploit and scan metadata)
  • The Metasploit Framework
  • Nuclei (with latest templates)
  • Nmap, Masscan, Hping3, and raw-packet tooling
  • ReverseAPK toolchain (jadx, apktool, dex2jar)
  • Java runtime (for Java-based scanners)
  • The complete Sn1per scan engine and Pro web UI

Prerequisites Checklist

Before running the installer, confirm:

  1. You are logged in as root or have passwordless sudo access
  2. No other service is bound to TCP port 1337 (ss -lntp | grep 1337 returns nothing)
  3. The host can reach https://sn1persecurity.com over HTTPS
  4. Existing Apache configuration is backed up — the installer replaces the active Apache site on port 1337
  5. You have a stable internet connection for the duration of the install (10–20 minutes)

From a root shell on the target host:

curl https://sn1persecurity.com/pro/10.0/<your-license-hash>/activation.sh | sudo bash

The installer will:

  • Validate your license and register this machine
  • Install all required packages and dependencies
  • Configure Apache on TCP 1337 with HTTPS + Digest authentication
  • Deploy the Sn1per scan engine and Pro web UI
  • Generate a strong random password for the admin user
  • Initialize the Metasploit PostgreSQL database
  • Fix the pg gem for PostgreSQL 18.x (known Metasploit issue)
  • Install Apache systemd overrides required for raw-packet scan tools

At the end, the installer prints the admin password to the terminal. Save it, or retrieve it later with:

sudo cat /usr/share/sniper/pro/data/.admin-password

Docker Install

See Docker for the full container workflow. Quick version:

docker run -dit --name sn1per-pro -p 1337:1337 --privileged kalilinux/kali-rolling
docker exec -it sn1per-pro bash
apt update && apt install -y curl sudo
curl https://sn1persecurity.com/pro/10.0/<your-license-hash>/activation.sh | bash

The --privileged flag is required so that raw sockets, full capability set, and seccomp/AppArmor are available to the scan toolchain (nmap SYN sweeps, nuclei Go JIT, Metasploit modules).

Post-Install Verification

# Apache is serving HTTPS on 1337
curl -kI https://127.0.0.1:1337

# Admin password file was created
sudo ls -l /usr/share/sniper/pro/data/.admin-password

# Scan engine is on PATH
which sniper && sniper -h | head -20

# Metasploit database is initialized
sudo -u postgres psql -l | grep msf

If any of these fail, see Troubleshooting below.

First Login

Open https://127.0.0.1:1337 (or https://YOUR.SERVER.IP:1337 for remote hosts) in a browser. The certificate is self-signed — accept the warning on first visit. Log in as admin with the password generated at install.

License Management

Activation

Activation happens automatically during the first install. Your activation URL contains a one-time installer tied to your license hash — anyone who runs it will bind the license to their machine, so treat the URL like a credential.

If activation is interrupted, safely re-run the same curl ... | sudo bash command on the same host. The installer detects existing partial state and resumes.

De-registration (freeing your license)

Sn1per Pro is licensed to a single machine at a time. Before moving to a new host, cloning the host, or migrating to a new VM, de-register the current machine first:

sudo bash /sniper/uninstall.sh

This notifies the Sn1per licensing server that the host is releasing the license, then removes the Sn1per Professional files. Once complete, you can run your activation URL on a different host.

Uninstallation

Uninstallation uses the same command as de-registration:

sudo bash /sniper/uninstall.sh

The uninstaller will:

  • De-register the current machine from the licensing server
  • Remove /usr/share/sniper and all Sn1per Pro files
  • Restore the original Apache site configuration and ports file
  • Restore the original sudoers and SSL certificate backups
  • Restart Apache so the host returns to its previous state

License Transfer / Multi-Machine Policy

  • Single-machine binding — your license is valid on ONE machine at a time. The activation URL binds the license to the host’s machine ID on first install.
  • Moving to a new host — always de-register the old host first. Installing without de-registering will be rejected by the licensing server.
  • Hardware or OS changes — full OS reinstalls, replacing the system disk, or moving the VM to a different virtualization platform can change the machine ID. If you hit an activation failure after such a change, contact support and we will reset your license.
  • Lost access to the old host — if the host was destroyed or decommissioned and you can no longer run the de-register command, email [email protected] with your license key and we will release it manually.

Troubleshooting

Apache fails to start on port 1337

Another service is probably bound to the port. Check:

sudo ss -lntp | grep 1337
sudo systemctl status apache2
sudo journalctl -u apache2 --no-pager -n 40

Stop the conflicting service or edit /etc/apache2/ports.conf + the sites-enabled config to use a different port.

Admin password lost

Retrieve it from disk:

sudo cat /usr/share/sniper/pro/data/.admin-password

If that file is missing, reset the digest hash directly (replacement password NEW_PASS):

HA1=$(printf '%s' "admin:restricted:NEW_PASS" | md5sum | awk '{print $1}')
sudo bash -c "echo "admin:restricted:$HA1" > /etc/htdigest/.htdigest"
sudo systemctl reload apache2

Browser warns about the TLS certificate

Expected — the installer generates a self-signed certificate. Accept the warning, or replace server.crt / server.key in /etc/apache2/ssl/ with your own certificate pair and run sudo systemctl reload apache2.

Metasploit database errors after a system upgrade to PostgreSQL 18

The installer fixes the known pg 1.5.9 crash automatically. If you hit the issue after a later upgrade, re-run:

sudo /opt/metasploit-framework/embedded/bin/gem install pg -v '>=1.6.0'
sudo msfdb reinit

Need more help?

See Docker for container-specific issues, or email [email protected] with your license key and a short description of the problem.

Something missing, unclear, or out-of-date?

Email the team