-
Notifications
You must be signed in to change notification settings - Fork 0
Home
Andre Henrique edited this page Mar 28, 2026
·
3 revisions
Advanced Printer Penetration Testing Toolkit — v3.13.0
Welcome to the PrinterReaper documentation wiki. Select a page below for detailed documentation on each feature.
Language / Idioma: English · Português (pt-BR)
| Page | Description |
|---|---|
| Installation | Prerequisites, virtual environment, dependencies |
| Quick Start | First scan in 60 seconds |
| Discovery | Find printers: local SNMP, WSD |
| Online Discovery Dorks |
--discover-online with structured dorks: vendor, country, region, port, city, CPE |
| Reconnaissance |
--scan, --scan-ml, banner grab, CVE lookup, ML |
| Auto Exploit |
--auto-exploit — automatic selection, verification, parameter pre-fill, and execution |
| Interactive Shell | PJL, PostScript, PCL — all 109 commands with examples |
| Brute Force Login |
--bruteforce, wordlists, tokens, variations |
| Exploit Library |
--xpl-* flags, exploit modules, writing custom exploits |
| Attack Matrix |
--attack-matrix — full BlackHat 2017 campaign |
| Lateral Movement | SSRF pivot, network map, LDAP hash capture |
| Storage & Firmware |
--storage, --firmware, --implant
|
| Cross-Site Printing | XSP + CORS spoofing payload generator |
| Send Print Job |
--send-job — print any file type to target |
| Wordlists | Format, vendor sections, tokens, custom wordlists |
| Configuration |
config.json, API keys, --check-config
|
| Custom Exploits | Write your own exploit.py module |
| Supported Vendors | Default credentials and exploits per vendor |
# Discover printers on local network
python printer-reaper.py --discover-local
# Passive fingerprint + CVE scan (no payloads)
python printer-reaper.py 192.168.1.100 --scan
# PJL interactive shell
python printer-reaper.py 192.168.1.100 pjl
# Credential brute-force with serial number
python printer-reaper.py 192.168.1.100 --bruteforce --bf-vendor epson --bf-serial XAABT77481
# Full attack matrix campaign (dry-run)
python printer-reaper.py 192.168.1.100 --attack-matrix
# List all exploit modules
python printer-reaper.py 192.168.1.100 --xpl-list| Language | Home page |
|---|---|
| English (default) | Home |
| Português (pt-BR) | Home-pt-BR |
Author: Andre Henrique · @mrhenrike · LinkedIn · X/Twitter