{"id":63083,"date":"2026-04-25T09:50:16","date_gmt":"2026-04-25T16:50:16","guid":{"rendered":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/architecture\/"},"modified":"2026-04-25T09:50:16","modified_gmt":"2026-04-25T16:50:16","slug":"architecture","status":"publish","type":"page","link":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/architecture\/","title":{"rendered":"Architecture"},"content":{"rendered":"<div class=\"sn-breadcrumb\"><a href=\"\/wordpress\/documentation\/\">Documentation<\/a><span class=\"sep\">\/<\/span><span>Architecture<\/span><\/div>\n<p>Sn1per Professional 2026 pairs a bash-based scan engine with a modernized PHP web UI on Apache, and optionally integrates with an AI \/ RAG stack for augmented analysis. This doc describes how the components fit together.<\/p>\n<h2 id=\"high-level-stack\">High-level stack<\/h2>\n<pre><code>Browser (HTTPS :1337)\n      |\n      v\nApache 2.4  --- Digest Auth --- \/etc\/htdigest\/.htdigest\n      |\n      v\nPHP 8.4 Web UI  (mod_php, www-data)\n      |\n      |---&gt; JSON API v1.0 (api.php)\n      |\n      |---&gt; Scan launcher (server-*.php) --- sudo \/ sn1per-exec --&gt; sniper CLI\n      |\n      |---&gt; File-based state (loot\/workspace\/&lt;target&gt;\/)\n      |\n      |---&gt; PostgreSQL (via msfdb) for Metasploit\n      |\n      |---&gt; Optional RAG Engine (HTTP :8000) for AI-augmented analysis\n      |\n      |---&gt; Optional Ollama \/ OpenAI \/ Claude \/ Gemini for LLM calls\n<\/code><\/pre>\n<h2 id=\"components\">Components<\/h2>\n<h3 id=\"scan-engine-bash\">Scan engine (bash)<\/h3>\n<ul>\n<li><strong>Entry point:<\/strong> <code>\/usr\/share\/sniper\/sniper<\/code> \u2014 the main <code>sniper<\/code> CLI<\/li>\n<li><strong>Mode scripts:<\/strong> <code>\/usr\/share\/sniper\/modes\/*.sh<\/code> \u2014 27 scan modes<\/li>\n<li><strong>Shared functions:<\/strong> <code>\/usr\/share\/sniper\/modes\/functions.sh<\/code><\/li>\n<li><strong>Config:<\/strong> <code>\/usr\/share\/sniper\/sniper.conf<\/code> (global), plus templates under <code>\/usr\/share\/sniper\/conf\/<\/code><\/li>\n<li><strong>Output:<\/strong> <code>\/usr\/share\/sniper\/loot\/workspace\/&lt;target&gt;\/<\/code> \u2014 per-target tree of raw tool output, CSV parsing, and findings<\/li>\n<\/ul>\n<p>The scan engine is the same core that ships with Enterprise and SE editions. Pro 2026&#8217;s additions are primarily in the web UI and the AI \/ RAG hooks.<\/p>\n<h3 id=\"pro-web-ui-php\">Pro web UI (PHP)<\/h3>\n<p>Served by Apache from <code>\/usr\/share\/sniper\/pro\/<\/code>. Layout:<\/p>\n<pre><code>pro\/\n\u251c\u2500\u2500 api.php                 # JSON API v1.0 router\n\u251c\u2500\u2500 settings.php            # Per-install configuration (license key, limits)\n\u251c\u2500\u2500 workspace-navigator.php # Dashboard (all workspaces)\n\u251c\u2500\u2500 workspace-report.php    # Per-workspace summary\n\u251c\u2500\u2500 host-report.php         # Per-host detail\n\u251c\u2500\u2500 addons\/                 # Nav pages + drawer content + sidebar widgets\n\u2502   \u251c\u2500\u2500 nav-*.php           # Top-level pages \/ drawer content (notes, scheduled tasks, config editor, scan tasks, endpoints, \u2026)\n\u2502   \u251c\u2500\u2500 server-*.php        # Backend endpoints for scan launch, bruteforce, fuzzer, masspwn, export, \u2026\n\u2502   \u251c\u2500\u2500 sidebar-*.php       # Quick Commands offcanvas widgets\n\u2502   \u2514\u2500\u2500 workspace-*.php     # Per-workspace action handlers\n\u251c\u2500\u2500 lib\/                    # PHP helpers (CSRF, sanitize, cache, workspace, html, bootstrap)\n\u251c\u2500\u2500 assets\/                 # Bootstrap 5 + Tabler + DataTables 2.x + Chart.js + Font Awesome\n\u251c\u2500\u2500 data\/                   # Admin password (.admin-password), runtime state\n\u251c\u2500\u2500 bin\/                    # SUID wrappers (sn1per-exec)\n\u2514\u2500\u2500 docs\/                   # This documentation\n<\/code><\/pre>\n<h3 id=\"ui-framework\">UI framework<\/h3>\n<ul>\n<li><strong>Bootstrap 5.3<\/strong> via the Tabler theme (upgraded from legacy Bootstrap 3.3.7)<\/li>\n<li><strong>DataTables 2.x<\/strong> with export buttons (CSV, Excel, PDF, Copy)<\/li>\n<li><strong>Chart.js<\/strong> for severity gauges and timeline charts<\/li>\n<li><strong>Font Awesome<\/strong> icon set<\/li>\n<li><strong>Custom:<\/strong> <code>pro\/assets\/js\/sn1per-ui.js<\/code> handles topbar drawer, scan-form interception, offcanvas, theme toggle<\/li>\n<\/ul>\n<h3 id=\"topbar-drawer\">Topbar drawer<\/h3>\n<p>A universal slide-over replaces legacy modals for notes, scheduled tasks, config editing, scan tasks, and terminal output. It&#8217;s defined in <code>pro\/addons\/nav-header.php<\/code>, opened by <code>openTopbarDrawer(url, title)<\/code> in <code>sn1per-ui.js<\/code>, and content is fetched over AJAX with CSRF tokens. Edit forms inside the drawer post through the same <code>server-*.php<\/code> endpoints as the full-page equivalents.<\/p>\n<h3 id=\"csrf-input-sanitization\">CSRF \/ input sanitization<\/h3>\n<p>Every state-changing endpoint requires a valid CSRF token:<\/p>\n<ul>\n<li>Token stored at <code>\/usr\/share\/sniper\/pro\/.csrf_token<\/code> (www-data 0640), rotated every 1 hour<\/li>\n<li><code>csrf_field()<\/code> emits the hidden form input; <code>csrf_verify()<\/code> validates POSTs; <code>csrf_url()<\/code> appends <code>?csrf_token=...<\/code> to GET links<\/li>\n<li>Input paths are validated against a required base directory via <code>validate_file_path()<\/code> in <code>pro\/lib\/sanitize.php<\/code>, which resolves through <code>realpath()<\/code> and enforces the base prefix<\/li>\n<\/ul>\n<h3 id=\"privilege-escalation\">Privilege escalation<\/h3>\n<p>The web UI runs as <code>www-data<\/code>. Scan tools require root (raw sockets, <code>nmap<\/code> SYN scans, <code>nuclei<\/code> JIT, Metasploit post modules, packet-capture tools). Pro 2026 resolves this three ways:<\/p>\n<ol>\n<li><strong>Passwordless sudo for <code>www-data<\/code><\/strong> \u2014 the installer appends <code>www-data ALL=(ALL) NOPASSWD: ALL<\/code> to <code>\/etc\/sudoers<\/code>. Used by most server-side endpoints.<\/li>\n<li><strong>SUID wrapper<\/strong> \u2014 <code>\/usr\/share\/sniper\/bin\/sn1per-exec<\/code> (compiled from <code>pro\/bin\/sn1per-exec.c<\/code>) is a small SUID binary that sets <code>ROOT<\/code> env and execs its arguments as root. Symlinked into <code>\/usr\/local\/bin\/sn1per-exec<\/code>.<\/li>\n<li><strong>systemd drop-in<\/strong> \u2014 <code>\/etc\/systemd\/system\/apache2.service.d\/sniper-override.conf<\/code> disables Kali&#8217;s Apache hardening (<code>Protect*=false<\/code>, <code>Restrict*=false<\/code>, <code>MemoryDenyWriteExecute=false<\/code>, empty <code>SystemCallFilter=<\/code>). Without this, <code>www-data<\/code>-forked scan tools hit seccomp\/AppArmor walls.<\/li>\n<\/ol>\n<h3 id=\"json-api-v10\">JSON API v1.0<\/h3>\n<p><code>pro\/api.php<\/code> provides a router over scan state. Supports both HTTP Digest authentication and an <code>X-API-Key<\/code> header. Actions include workspace listing, host listing, vulnerability query, scan-status polling, and cache management. See <a href=\"\/wordpress\/documentation\/usage\/#json-api\">Usage<\/a> for examples.<\/p>\n<h3 id=\"sc0pe-vulnerability-framework\">SC0PE vulnerability framework<\/h3>\n<p>Sn1per&#8217;s vulnerability detection pipeline (parses tool output \u2192 structured findings in CSV \/ JSON \/ SARIF). Key scripts:<\/p>\n<ul>\n<li><code>sc0pe.sh<\/code> \u2014 main orchestrator<\/li>\n<li><code>sc0pe-active-webscan.sh<\/code> \u2014 active web vuln scanning<\/li>\n<li><code>sc0pe-network-scan.sh<\/code> \u2014 network vuln scanning<\/li>\n<li><code>sc0pe-passive-webscan.sh<\/code> \u2014 passive web recon<\/li>\n<li><code>static-grep-search.sh<\/code> \u2014 static code analysis via grep patterns<\/li>\n<li><code>javascript-analysis.sh<\/code> \u2014 JavaScript code analysis<\/li>\n<\/ul>\n<h3 id=\"advanced-modules\">Advanced modules<\/h3>\n<ul>\n<li><strong>ReverseAPK<\/strong> \u2014 APK decompilation (jadx, apktool, dex2jar) with web upload form and vulnerability pass over decompiled source<\/li>\n<li><strong>MassPwn<\/strong> \u2014 multi-target exploitation from a curated exploit-module database (<code>masspwn-modules.txt<\/code>) and payload repository (<code>masspwn-payloads.txt<\/code>)<\/li>\n<li><strong>Threat Intel<\/strong> \u2014 RSS feed aggregation, CISA KEV CSV, nuclei template integration<\/li>\n<li><strong>Nessus integration<\/strong> \u2014 imports and parses Nessus <code>.nessus<\/code> files into the findings DB<\/li>\n<li><strong>Burp Suite integration<\/strong> \u2014 configurable upstream proxy; also supports Burp&#8217;s MCP integration<\/li>\n<\/ul>\n<h3 id=\"ai-integration\">AI integration<\/h3>\n<p>When <code>AI_ENABLED=1<\/code> in <code>sniper.conf<\/code>, the scan engine calls an LLM for scan analysis, decisioning, vulnerability triage, and report enhancement. Providers:<\/p>\n<table>\n<thead>\n<tr>\n<th>Provider<\/th>\n<th><code>AI_PROVIDER<\/code><\/th>\n<th>Notes<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Ollama<\/td>\n<td><code>ollama<\/code><\/td>\n<td>Default. Local or remote Ollama endpoint<\/td>\n<\/tr>\n<tr>\n<td>OpenAI<\/td>\n<td><code>openai<\/code><\/td>\n<td>GPT models<\/td>\n<\/tr>\n<tr>\n<td>Anthropic<\/td>\n<td><code>claude<\/code><\/td>\n<td>Claude API (Opus\/Sonnet\/Haiku)<\/td>\n<\/tr>\n<tr>\n<td>Claude Code CLI<\/td>\n<td><code>claude-code<\/code><\/td>\n<td>Autonomous tool use via the Claude Code CLI<\/td>\n<\/tr>\n<tr>\n<td>Google<\/td>\n<td><code>gemini<\/code><\/td>\n<td>Gemini API<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Phase 2 (active verification) can optionally use a different model via <code>AI_PHASE2_*<\/code> settings for WAF bypass \/ payload generation.<\/p>\n<h3 id=\"rag-security-knowledge-engine-optional\">RAG Security Knowledge Engine (optional)<\/h3>\n<p>If a RAG engine is running at <code>RAG_API_URL<\/code> (default <code>http:\/\/localhost:8000<\/code>), Sn1per Pro pushes scan findings into the KB via <code>\/ingest<\/code> and retrieves context for AI prompts via <code>\/retrieve<\/code>. The RAG KB is seeded from OWASP Top 10, CWE Top 25, Exploit-DB source code, Nuclei templates, SecLists payloads, NVD CVEs, and verified scan findings. See the RAG engine&#8217;s own docs for setup.<\/p>\n<h3 id=\"data-pipeline\">Data pipeline<\/h3>\n<pre><code>sniper CLI\n  -&gt; \/usr\/share\/sniper\/modes\/*.sh (tool invocation)\n  -&gt; \/usr\/share\/sniper\/loot\/workspace\/&lt;target&gt;\/\n       \u251c\u2500\u2500 scans\/                # Raw tool output per module\n       \u251c\u2500\u2500 web\/                  # HTTP probes, screenshots, katana crawl\n       \u251c\u2500\u2500 domains\/, ips\/        # Recon lists\n       \u251c\u2500\u2500 vulnerabilities\/      # Parsed findings (CSV \/ JSON \/ sc0pe format)\n       \u251c\u2500\u2500 notes\/                # User notes (editable from web UI)\n       \u2514\u2500\u2500 scans\/scheduled\/      # daily.sh \/ weekly.sh \/ monthly.sh\n  -&gt; Pro web UI (PHP reads the file tree + PostgreSQL) -&gt; HTML reports \/ JSON API\n<\/code><\/pre>\n<h2 id=\"docker-architecture\">Docker architecture<\/h2>\n<p>The same stack inside a single container:<\/p>\n<pre><code>Docker container (kalilinux\/kali-rolling or equivalent)\n\u251c\u2500\u2500 Apache 2.4 + PHP 8.4 (port 1337 exposed)\n\u251c\u2500\u2500 PostgreSQL (local socket)\n\u251c\u2500\u2500 Metasploit Framework\n\u251c\u2500\u2500 Scan engine + 50+ bundled tools\n\u251c\u2500\u2500 SSL certs (server.crt \/ server.key, regenerated at install)\n\u251c\u2500\u2500 Digest auth (\/etc\/htdigest\/.htdigest, random admin password)\n\u2514\u2500\u2500 systemd-equivalent via --privileged (or --cap-add for narrower runs)\n<\/code><\/pre>\n<p>The container must be started with <code>--privileged<\/code> (recommended) so that raw sockets, the full capability set, and an unrestricted seccomp profile are available. See <a href=\"\/wordpress\/documentation\/docker\/\">Docker<\/a> for rationale and alternatives.<\/p>\n<h2 id=\"filesystem-layout\">Filesystem layout<\/h2>\n<table>\n<thead>\n<tr>\n<th>Path<\/th>\n<th>Purpose<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><code>\/usr\/share\/sniper\/<\/code><\/td>\n<td>Install root<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/sniper.conf<\/code><\/td>\n<td>Scan engine config<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/sniper<\/code><\/td>\n<td>CLI entry point<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/modes\/<\/code><\/td>\n<td>Scan mode scripts<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/conf\/<\/code><\/td>\n<td>Config templates selectable from the UI<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/pro\/<\/code><\/td>\n<td>Pro web UI root<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/pro\/settings.php<\/code><\/td>\n<td>Per-install PHP config<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/pro\/data\/.admin-password<\/code><\/td>\n<td>Generated admin password<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/loot\/workspace\/&lt;target&gt;\/<\/code><\/td>\n<td>Per-target scan loot<\/td>\n<\/tr>\n<tr>\n<td><code>\/usr\/share\/sniper\/bin\/sn1per-exec<\/code><\/td>\n<td>SUID exec wrapper<\/td>\n<\/tr>\n<tr>\n<td><code>\/etc\/htdigest\/.htdigest<\/code><\/td>\n<td>Apache Digest auth DB<\/td>\n<\/tr>\n<tr>\n<td><code>\/etc\/apache2\/sites-enabled\/apache_remote_ssl_digest_auth_port_1337.conf<\/code><\/td>\n<td>Apache site config<\/td>\n<\/tr>\n<tr>\n<td><code>\/etc\/systemd\/system\/apache2.service.d\/sniper-override.conf<\/code><\/td>\n<td>Apache hardening override<\/td>\n<\/tr>\n<tr>\n<td><code>\/sniper\/uninstall.sh<\/code><\/td>\n<td>De-register + remove Sn1per Pro<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"see-also\">See Also<\/h2>\n<ul>\n<li><a href=\"\/wordpress\/documentation\/installation\/\">Installation<\/a> \u2014 provisioning the stack<\/li>\n<li><a href=\"\/wordpress\/documentation\/configuration\/\">Configuration<\/a> \u2014 all tunables<\/li>\n<li><a href=\"\/wordpress\/documentation\/usage\/\">Usage<\/a> \u2014 how to drive the stack<\/li>\n<li><a href=\"\/wordpress\/documentation\/docker\/\">Docker<\/a> \u2014 container-specific notes<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Documentation\/Architecture Sn1per Professional 2026 pairs a bash-based scan engine with a modernized PHP web UI on Apache, and optionally integrates with an AI \/ RAG stack for augmented analysis. This\u2026<\/p>\n","protected":false},"author":0,"featured_media":0,"parent":2284,"menu_order":50,"comment_status":"closed","ping_status":"closed","template":"page-templates\/template-doc-page.php","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-63083","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_shortlink":"https:\/\/wp.me\/PdnW96-gpt","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":63081,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/configuration\/","url_meta":{"origin":63083,"position":0},"title":"Configuration","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Configuration Most Sn1per Pro behavior is controlled by two files: \/usr\/share\/sniper\/sniper.conf \u2014 scan engine defaults (threads, DNS, AI, RAG, Burp, notifications, etc.) \/usr\/share\/sniper\/pro\/settings.php \u2014 Pro web UI tunables (license key, install dir, workspace limits, Burp host) Change either file and restart Apache (sudo systemctl reload apache2) to pick up PHP-side\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63080,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/installation\/","url_meta":{"origin":63083,"position":1},"title":"Installation","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Installation Sn1per Professional 2026 installs in two modes: bare metal on a supported Linux host, or inside a Docker container. The same activation.sh URL (sent in your order confirmation email) drives both. System Requirements Requirement Minimum Recommended Operating system Kali Linux Rolling, Ubuntu 22.04+, Debian 12+, or Parrot OS Kali\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63079,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/getting-started\/","url_meta":{"origin":63083,"position":2},"title":"Getting Started","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Getting Started This guide gets you from a fresh system to a running Sn1per Pro instance in under 20 minutes. For deeper coverage, see Installation and Configuration. Prerequisites A 64-bit Linux host (Kali Rolling recommended; Ubuntu 22.04+, Debian 12+, and Parrot OS also supported) Root or passwordless sudo access 4\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2284,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/","url_meta":{"origin":63083,"position":3},"title":"Documentation","author":"xer0dayz","date":"October 7, 2018","format":false,"excerpt":"[vc_row][vc_column][vc_column_text] Sn1per Professional Documentation The official Sn1per Professional software manual. Topics System Requirements Getting Started Help Topics Integration Guides Modules Sn1per Professional Demos Sn1per Enterprise Boot Camp \u00a0 System Requirements Sn1per Professional requires the following to run correctly: A Kali Linux operating system Kali 2024.4 VMware\/VirtualBox pre-built VMs, Ubuntu 22.04\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Sn1perSecurity-Attack-Surface-Management-header2","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/10\/Sn1perSecurity-Attack-Surface-Management-header2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":63084,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/docker\/","url_meta":{"origin":63083,"position":4},"title":"Docker","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Docker Sn1per Professional 2026 can run inside a Docker container on any Docker-capable host. The recommended workflow starts a Kali base container and runs your license's activation.sh inside it \u2014 the same installer used on bare metal. Why --privileged is required Sn1per Pro runs a broad offensive toolchain: nmap (raw\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":63082,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/usage\/","url_meta":{"origin":63083,"position":5},"title":"Usage","author":"","date":"April 25, 2026","format":false,"excerpt":"Documentation\/Usage Sn1per Professional 2026 exposes three interfaces: a web UI (primary), a CLI (sniper command), and a JSON API. Web UI The web UI is served on HTTPS port 1337. Log in as admin with the password from \/usr\/share\/sniper\/pro\/data\/.admin-password. Workspace Navigator The landing page after login. One row per workspace\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/63083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=63083"}],"version-history":[{"count":0,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/63083\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/2284"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=63083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}