nuclei-templates/profiles
Parth Malhotra ea1186188b
Update misconfigurations.yml
2024-06-25 13:03:44 +05:30
..
README.md Update profiles README (#9541) 2024-04-10 17:50:48 +05:30
all.yml Update all.yml 2024-06-25 13:00:07 +05:30
aws-cloud-config.yml AWS Code Templates (#8915) 2024-04-11 19:53:07 +05:30
cloud.yml
compliance.yml Update compliance.yml 2024-06-25 12:56:29 +05:30
cves.yml Update cves.yml 2024-06-25 12:54:21 +05:30
default-login.yml Update default-login.yml 2024-06-25 12:08:40 +05:30
kev.yml Update kev.yml 2024-06-25 12:05:54 +05:30
misconfigurations.yml Update misconfigurations.yml 2024-06-25 13:03:44 +05:30
osint.yml
pentest.yml
privilege-escalation.yml
recommended.yml Merge remote-tracking branch 'origin' into fix-wp-FP 2024-04-08 16:54:04 +05:30
subdomain-takeovers.yml Update subdomain-takeovers.yml 2024-05-31 01:06:53 +05:30
wordpress.yml Update wordpress.yml 2024-06-25 13:01:22 +05:30

README.md

About

This directory hosts Nuclei configuration profiles specifically designed for various use cases, including Bug Bounty, OSINT, and Compliance. The centerpiece of these configurations is the recommended.yml file, which offers a handpicked selection of templates that are both efficient and relevant for the majority of scanning scenarios. This curated approach is intended to provide a more focused scanning experience, reducing the occurrence of irrelevant results that often accompany broader scans.

Usage

The Nuclei configuration profiles are straightforward to integrate into your existing scanning workflows. Below are guidelines on how to utilize the recommended.yml configuration for a streamlined scanning process, as well as instructions for customizing your scans to fit specific needs.

To execute a scan with the recommended.yml configuration, which has been optimized for general use to yield efficient and relevant results, use the following command:

nuclei -config ~/nuclei-templates/profiles/recommended.yml

Customizing Your Scanning Configuration

If you have specific requirements or wish to modify the focus of your scans, you can create a custom configuration file based on the structure of recommended.yml. Adjust the template selections to fit your targeted scanning objectives. Once your configuration is set, run Nuclei using your custom file with the command:

nuclei -config your-custom-config.yml

Examples

Here are examples of how to run scans for specific scenarios:

Running Local Privilege Escalation Checks

For targeting local privilege escalation vulnerabilities, utilize the dedicated config as follows:

nuclei -config ~/nuclei-templates/profiles/privilege-escalation.yml

Config Focusing on OSINT

nuclei -config ~/nuclei-templates/profiles/osint.yml