Nuclei config profiles for different use cases (#8859)
* Update CVE-2023-46359.yaml * scan profiles * updated configs * misc update --------- Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>patch-1
parent
05de5abf8f
commit
eb87c1cfe5
|
@ -0,0 +1,26 @@
|
|||
# This is a configuration file for the bugbounty template profile.
|
||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
||||
# They should be placed under the 'config' directory at:
|
||||
# https://github.com/projectdiscovery/nuclei-templates
|
||||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/bugbounty.yml -list target_list_to_scan.txt
|
||||
|
||||
severity:
|
||||
- critical
|
||||
- high
|
||||
- medium
|
||||
- low
|
||||
- unknown
|
||||
|
||||
type:
|
||||
- http
|
||||
- tcp
|
||||
- javascript
|
||||
|
||||
exclude-tags:
|
||||
- tech
|
||||
- dos
|
||||
- fuzz
|
||||
- creds-stuffing
|
||||
- token-spray
|
||||
- osint
|
|
@ -0,0 +1,10 @@
|
|||
# This is a configuration file for the cloud template profile.
|
||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
||||
# They should be placed under the 'config' directory at:
|
||||
# https://github.com/projectdiscovery/nuclei-templates
|
||||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/cloud.yml -list target_list_to_scan.txt
|
||||
|
||||
tags:
|
||||
- cloud
|
||||
- devops
|
|
@ -0,0 +1,29 @@
|
|||
# This is a configuration file for the compliance template profile.
|
||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
||||
# They should be placed under the 'config' directory at:
|
||||
# https://github.com/projectdiscovery/nuclei-templates
|
||||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/compliance.yml -list target_list_to_scan.txt
|
||||
|
||||
tags:
|
||||
- misconfig
|
||||
- cve
|
||||
- exposure
|
||||
- default-login
|
||||
- xss
|
||||
- lfi
|
||||
- edb
|
||||
- rce
|
||||
- sqli
|
||||
- unauth
|
||||
- default-login
|
||||
- ssrf
|
||||
- redirect
|
||||
- disclosure
|
||||
- takeover
|
||||
- traversal
|
||||
- generic
|
||||
- deserialization
|
||||
- ssl
|
||||
- keys
|
||||
- token
|
|
@ -0,0 +1,16 @@
|
|||
# This is a configuration file for the osint template profile.
|
||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
||||
# They should be placed under the 'config' directory at:
|
||||
# https://github.com/projectdiscovery/nuclei-templates
|
||||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/osint.yml -list target_list_to_scan.txt
|
||||
|
||||
tags:
|
||||
- osint
|
||||
- honeypot
|
||||
- backdoor
|
||||
- c2
|
||||
- osint-social
|
||||
- exposures
|
||||
- malware
|
||||
- enum
|
|
@ -0,0 +1,19 @@
|
|||
# This is a configuration file for the pentest template profile.
|
||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
||||
# They should be placed under the 'config' directory at:
|
||||
# https://github.com/projectdiscovery/nuclei-templates
|
||||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/pentest.yml -list target_list_to_scan.txt
|
||||
|
||||
|
||||
type:
|
||||
- http
|
||||
- tcp
|
||||
- javascript
|
||||
- dns
|
||||
- ssl
|
||||
|
||||
exclude-tags:
|
||||
- dos
|
||||
- fuzz
|
||||
- osint
|
|
@ -5,8 +5,17 @@
|
|||
# Here is an example of how to use a config profile:
|
||||
# nuclei -config config/recommended.yml -list target_list_to_scan.txt
|
||||
|
||||
exclude-severity:
|
||||
- info
|
||||
severity:
|
||||
- critical
|
||||
- high
|
||||
- medium
|
||||
- low
|
||||
- unknown
|
||||
|
||||
type:
|
||||
- dns
|
||||
- tcp
|
||||
- javascript
|
||||
|
||||
exclude-tags:
|
||||
- tech
|
||||
|
@ -14,15 +23,7 @@ exclude-tags:
|
|||
- fuzz
|
||||
- creds-stuffing
|
||||
- token-spray
|
||||
|
||||
exclude-protocols:
|
||||
- ssl
|
||||
- dns
|
||||
- file
|
||||
- code
|
||||
- whois
|
||||
- headless
|
||||
- workflow
|
||||
- osint
|
||||
|
||||
exclude-id:
|
||||
- CVE-2021-45967
|
||||
|
@ -86,3 +87,4 @@ exclude-id:
|
|||
- open-proxy-internal
|
||||
- open-proxy-localhost
|
||||
- open-proxy-portscan
|
||||
|
||||
|
|
Loading…
Reference in New Issue