{"id":15302,"date":"2021-03-14T16:17:57","date_gmt":"2021-03-14T23:17:57","guid":{"rendered":"https:\/\/xerosecurity.com\/wordpress\/?page_id=15302"},"modified":"2024-09-17T14:22:15","modified_gmt":"2024-09-17T21:22:15","slug":"threat-intel-add-on-v1-0-documentation","status":"publish","type":"page","link":"https:\/\/sn1persecurity.com\/wordpress\/threat-intel-add-on-v1-0-documentation\/","title":{"rendered":"Threat Intel Add-on v1.0 Documentation"},"content":{"rendered":"<p>Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases with the new Threat Intel Add-on for Sn1per Professional!<\/p>\n<h4>Features<\/h4>\n<hr \/>\n<ul>\n<li>Quickly search for the latest CVE\u2019s, exploits and vulnerabilities easily<\/li>\n<li>Search local NMap scripts and Metasploit modules easily<\/li>\n<li>Stay up-to-date on emerging threats, vulnerabilities, news and exploits with over 20+ hand picked RSS feeds<\/li>\n<li>Perform OSINT and reconnaissance on any target IP or domain name, using built-in recon and Google dork links<\/li>\n<li>Join the top security servers on Slack and Discord to gather and share community based intelligence<\/li>\n<\/ul>\n<h4>Usage<\/h4>\n<hr \/>\n<h5>Search for NMap or Metasploit Exploits<\/h5>\n<p>To search for NMap or Metasploit scripts and exploits, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter a keyword to search for in the &#8220;Search&#8221; input box (ie. citrix)<\/li>\n<li>Click the &#8220;Search&#8221; button to start the search<\/li>\n<\/ol>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15304 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png\" alt=\"\" width=\"1653\" height=\"293\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png 1653w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-600x106.png 600w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-300x53.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-1024x182.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-768x136.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-1536x272.png 1536w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-400x71.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-800x142.png 800w\" sizes=\"auto, (max-width: 1653px) 100vw, 1653px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15303 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png\" alt=\"\" width=\"1446\" height=\"739\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png 1446w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b-600x307.png 600w\" sizes=\"auto, (max-width: 1446px) 100vw, 1446px\" \/><\/a><\/p>\n<h5>Viewing Threat Intel RSS Feeds<\/h5>\n<p>To view the latest threat intel rss feeds, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Select any of the RSS feeds from the &#8220;RSS&#8221; menu<\/li>\n<\/ol>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15305 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png\" alt=\"\" width=\"1429\" height=\"1208\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png 1429w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2-600x507.png 600w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\" \/><\/a><\/p>\n<h5>Perform Recon Using 3rd Party Online Tools<\/h5>\n<p>To perform recon against a domain name, company or IP address, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter the keyword to search for in the &#8220;Search&#8221; input box (ie. hackerone.com)<\/li>\n<li>Click on any of the recon or Google dork links from the &#8220;Recon Links&#8221; and &#8220;Google Dorks&#8221; menus<\/li>\n<\/ol>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15307 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png\" alt=\"\" width=\"1445\" height=\"1123\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png 1445w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-600x466.png 600w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-300x233.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-1024x796.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-768x597.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-400x311.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-800x622.png 800w\" sizes=\"auto, (max-width: 1445px) 100vw, 1445px\" \/><\/a><\/h4>\n<h5>Searching For Exploits and CVE&#8217;s Using 3rd Party Online Tools<\/h5>\n<p>To search for exploits and CVE&#8217;s using 3rd party online tools, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter the keyword to search for in the &#8220;Search&#8221; input box (ie. proxylogon)<\/li>\n<li>Click on any of the exploit links from the &#8220;Exploit Links&#8221; menu<\/li>\n<\/ol>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15308 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png\" alt=\"\" width=\"1453\" height=\"715\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png 1453w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-600x295.png 600w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-300x148.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-1024x504.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-768x378.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-400x197.png 400w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-800x394.png 800w\" sizes=\"auto, (max-width: 1453px) 100vw, 1453px\" \/><\/a><\/h4>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/documentation\/\">Back to Main Documentation<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases with the new Threat Intel Add-on for Sn1per Professional! Features Quickly search for the latest CVE\u2019s,\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-15302","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_shortlink":"https:\/\/wp.me\/PdnW96-3YO","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":17839,"url":"https:\/\/sn1persecurity.com\/wordpress\/add-ons\/","url_meta":{"origin":15302,"position":0},"title":"Sn1per Modules","author":"xer0dayz","date":"April 1, 2022","format":false,"excerpt":"[vc_row][vc_column width=\"1\/4\"][vc_single_image image=\"16636\" img_size=\"200x100\" alignment=\"center\" onclick=\"custom_link\" img_link_target=\"_blank\" css=\".vc_custom_1648947685813{padding-top: 25px !important;}\" link=\"https:\/\/sn1persecurity.com\/wordpress\/product\/command-execution-add-on-v2\/\"][\/vc_column][vc_column width=\"3\/4\"][vc_column_text] Command Execution Module Easily manage Sn1per Professional instances from the web interface without ever touching the command line. Find out more. [\/vc_column_text][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=\"1\/4\"][vc_single_image image=\"16497\" img_size=\"200x100\" alignment=\"center\" onclick=\"custom_link\" img_link_target=\"_blank\" css=\".vc_custom_1648947827793{padding-top: 25px !important;}\" link=\"https:\/\/sn1persecurity.com\/wordpress\/product\/masspwn-add-on-v1-0\/\"][\/vc_column][vc_column width=\"1\/4\"][vc_column_text] MassPwn Module Pop shells and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16011,"url":"https:\/\/sn1persecurity.com\/wordpress\/masspwn-add-on-v1-0-documentation\/","url_meta":{"origin":15302,"position":1},"title":"MassPwn Add-on v1.0 Documentation","author":"xer0dayz","date":"July 13, 2021","format":false,"excerpt":"Leverage the full power of Metasploit with the new \"MassPwn Add-on\" for Sn1per Professional v9.0. Features Simple GUI for Metasploit to set common options and settings Import all vulnerability scan data into Sn1per Professional automatically Launch single or multiple Metasploit modules and exploits in-line Launch auxiliary scans and exploits against\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34182,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/metasploit-integration\/","url_meta":{"origin":15302,"position":2},"title":"Metasploit Integration","author":"xer0dayz","date":"September 25, 2024","format":false,"excerpt":"Configuration To configure Sn1per to use the appropriate IP\/port for reverse Metasploit connections, edit your Sn1per configuration template under the \/sniper\/conf\/ directory: # METASPLOIT SCANNER CONFIG MSF_LHOST=\"127.0.0.1\" MSF_LPORT=\"4444\" METASPLOIT_IMPORT=\"1\" METASPLOIT_EXPLOIT=\"1\" MSF_LEGACY_WEB_EXPLOITS=\"1\" This will configure Sn1per to set the LHOST and LPORT values for all exploits and payloads to connect back\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63079,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/getting-started\/","url_meta":{"origin":15302,"position":3},"title":"Getting Started","author":"xer0dayz","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Getting Started This guide gets you from a fresh system to a running Sn1per Pro instance in under 20 minutes. For deeper coverage, see Installation and Configuration. Prerequisites A 64-bit Linux host (Kali Rolling recommended; Ubuntu 22.04+, Debian 12+, and Parrot OS also supported) Root or passwordless sudo access 4\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63083,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/architecture\/","url_meta":{"origin":15302,"position":4},"title":"Architecture","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Architecture Sn1per Professional 2026 pairs a bash-based scan engine with a modernized PHP web UI on Apache, and optionally integrates with an AI \/ RAG stack for augmented analysis. This doc describes how the components fit together. High-level stack Browser (HTTPS :1337) | v Apache 2.4 --- Digest Auth ---\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17857,"url":"https:\/\/sn1persecurity.com\/wordpress\/use-cases\/","url_meta":{"origin":15302,"position":5},"title":"Use Cases","author":"xer0dayz","date":"April 2, 2022","format":false,"excerpt":"[vc_row][vc_column][vc_column_text] Use Cases Whether you're looking to conduct simple reconnaissance or identify vulnerabilities in systems and applications, Sn1per offers the capabilities you need in one place. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\"1\/2\"][vc_column_text] Attack Surface Management Discover the attack surface and prioritize risk with our continuous Attack Surface Management platform. [\/vc_column_text][\/vc_column][vc_column width=\"1\/2\"][vc_column_text] Automated OSINT &\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=15302"}],"version-history":[{"count":6,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302\/revisions"}],"predecessor-version":[{"id":33732,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302\/revisions\/33732"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=15302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}