Some of the most popular tools by ProjectDiscovery are Nuclei (template-based vulnerability scanner), HTTPx (multipurpose HTTP toolkit), and Subfinder (subdomain enumeration and discovery tool). While the installation process is typically very straightforward for ProjectDiscovery tools, one can often encounter some difficulty setting up a proper environment to run the tool,
Nuclei templates are the core of the scanning engine, and having your custom templates can help significantly in your testing process.
Nuclei beyond HTTP: Using Nuclei to uncover vulnerabilities in raw TCP connections, DNS, files and more!
Hey there, fellow hackers! Are you ready to take your Nuclei skills to the next level? Buckle up, because in this blog post, we're going to explore the vast possibilities of Nuclei beyond its popular use with HTTP. Nuclei, developed by ProjectDiscovery, is a powerful and versatile tool that can
ProjectDiscovery is best known for creating open-source security tools like Nuclei, Subfinder, and HTTPx that are widely used and appreciated by the security community. Their approach to tool development aligns with the well-known "Unix Philosophy". But, what exactly does this mean? The Unix Philosophy The Unix Philosophy is a widely
Attention all Nuclei users! We're thrilled to announce a new Nuclei template release. This update will bring significant enhancements that will improve your overall experience. However, this release also includes breaking changes. To benefit from these improvements and avoid potential issues, please make sure to keep Nuclei engine updated to
Reconnaissance is an important step in identifying and building your organization's attack surface or targeted assets. Web crawling is a prominent reconnaissance technique that allows you to gather information by automatically traversing and extracting data from web pages. However, this process often results in unstructured data that contains countless URLs
As the world becomes increasingly connected, more and more devices are being exposed to the internet. This includes everything from industrial control systems to home routers and even refrigerators. Unfortunately, many of these devices are not properly secured, leaving them open to attack. This is where internet-based search engines like
This is the final post in our blog series on reconnaissance for penetration testing and bug bounty hunting. In this post, we look at some more creative ways to do active and passive reconnaissance to ensure completely coverage of your target's assets. Subsidiary and Acquisition Enumeration Subsidiary and acquisition enumeration,
Security is a crucial factor for both small and large enterprises. This has led to the evolution of DevOps into DevSecOps, which integrates security at an internal level. As we have discussed in previous blogs, it is important to implement security within your DevOps cycle to ensure that it becomes
Subscribe to ProjectDiscovery.io | Blog newsletter and stay updated.
Don't miss anything. Get all the latest posts delivered straight to your inbox. It's free!