# ==| Nuclei Templates Ignore list |== # ==================================== # # This list can be used to define template/s that will be blocked from execution. # When a folder/directory is listed under this list, the templates within folder can be executed only when running them directly. # For example, "nuclei -t fuzzing" will not work, "nuclei -t fuzzing/wp-plugin-scan.yaml" will be executed. # # Why ignore list? - To ensure nuclei is not getting used to hammer the every web server with templates that are meant to be used for specific use cases. # and that doesn't mean nuclei won't let you run these templates. if you know what you are doing, feel free to updates this list locally as per your need. # # This list also can be used to ignore templates that you wanted to exclude from every scan. # More details - https://github.com/projectdiscovery/nuclei#using-nuclei-ignore-file-for-template-exclusion .pre-commit-config.yaml cves/2013/CVE-2013-2251.yaml cves/2017/CVE-2017-7529.yaml cves/2020/CVE-2020-13379.yaml cves/2020/CVE-2020-16139.yaml # Fuzzing is excluded to avoid running bruteforce on every server as default. fuzzing/ # Wordlist directory contains payload to be used with templates. helpers/ miscellaneous/ # Workflows are excluded from default run to avoid duplicate scans. workflows/ # Adding older folder to avoid possilbe issue with nuclei ignore execution. misc/ default-credentials/ files/ generic-detections/ panels/ payloads/ security-misconfiguration/ subdomain-takeover/ tokens/