Nuclei config profiles for different use cases (#8859)

* Update CVE-2023-46359.yaml

* scan profiles

* updated configs

* misc update

---------

Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
patch-1
Prince Chaddha 2024-01-14 00:00:57 +05:30 committed by GitHub
parent 05de5abf8f
commit eb87c1cfe5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 113 additions and 11 deletions

26
config/bugbounty.yml Normal file
View File

@ -0,0 +1,26 @@
# This is a configuration file for the bugbounty template profile.
# Additional configuration profiles can be created for different types of nuclei scans.
# They should be placed under the 'config' directory at:
# https://github.com/projectdiscovery/nuclei-templates
# Here is an example of how to use a config profile:
# nuclei -config config/bugbounty.yml -list target_list_to_scan.txt
severity:
- critical
- high
- medium
- low
- unknown
type:
- http
- tcp
- javascript
exclude-tags:
- tech
- dos
- fuzz
- creds-stuffing
- token-spray
- osint

10
config/cloud.yml Normal file
View File

@ -0,0 +1,10 @@
# This is a configuration file for the cloud template profile.
# Additional configuration profiles can be created for different types of nuclei scans.
# They should be placed under the 'config' directory at:
# https://github.com/projectdiscovery/nuclei-templates
# Here is an example of how to use a config profile:
# nuclei -config config/cloud.yml -list target_list_to_scan.txt
tags:
- cloud
- devops

29
config/compliance.yml Normal file
View File

@ -0,0 +1,29 @@
# This is a configuration file for the compliance template profile.
# Additional configuration profiles can be created for different types of nuclei scans.
# They should be placed under the 'config' directory at:
# https://github.com/projectdiscovery/nuclei-templates
# Here is an example of how to use a config profile:
# nuclei -config config/compliance.yml -list target_list_to_scan.txt
tags:
- misconfig
- cve
- exposure
- default-login
- xss
- lfi
- edb
- rce
- sqli
- unauth
- default-login
- ssrf
- redirect
- disclosure
- takeover
- traversal
- generic
- deserialization
- ssl
- keys
- token

16
config/osint.yml Normal file
View File

@ -0,0 +1,16 @@
# This is a configuration file for the osint template profile.
# Additional configuration profiles can be created for different types of nuclei scans.
# They should be placed under the 'config' directory at:
# https://github.com/projectdiscovery/nuclei-templates
# Here is an example of how to use a config profile:
# nuclei -config config/osint.yml -list target_list_to_scan.txt
tags:
- osint
- honeypot
- backdoor
- c2
- osint-social
- exposures
- malware
- enum

19
config/pentest.yml Normal file
View File

@ -0,0 +1,19 @@
# This is a configuration file for the pentest template profile.
# Additional configuration profiles can be created for different types of nuclei scans.
# They should be placed under the 'config' directory at:
# https://github.com/projectdiscovery/nuclei-templates
# Here is an example of how to use a config profile:
# nuclei -config config/pentest.yml -list target_list_to_scan.txt
type:
- http
- tcp
- javascript
- dns
- ssl
exclude-tags:
- dos
- fuzz
- osint

View File

@ -5,8 +5,17 @@
# Here is an example of how to use a config profile:
# nuclei -config config/recommended.yml -list target_list_to_scan.txt
exclude-severity:
- info
severity:
- critical
- high
- medium
- low
- unknown
type:
- dns
- tcp
- javascript
exclude-tags:
- tech
@ -14,15 +23,7 @@ exclude-tags:
- fuzz
- creds-stuffing
- token-spray
exclude-protocols:
- ssl
- dns
- file
- code
- whois
- headless
- workflow
- osint
exclude-id:
- CVE-2021-45967
@ -86,3 +87,4 @@ exclude-id:
- open-proxy-internal
- open-proxy-localhost
- open-proxy-portscan