Collection of templates from various resources
☆43Dec 5, 2025Updated 3 months ago
Alternatives and similar repositories for nuclei_templates
Users that are interested in nuclei_templates are comparing it to the libraries listed below
Sorting:
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆81Nov 24, 2025Updated 3 months ago
- A Collection of Wordlists for Penetration Testing☆35Dec 13, 2025Updated 2 months ago
- ☆15Mar 21, 2025Updated 11 months ago
- Private Nuclei Templates☆100Feb 24, 2025Updated last year
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- ☆35Aug 2, 2022Updated 3 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 9 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- ☆173Nov 20, 2025Updated 3 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- ☆47May 31, 2024Updated last year
- This includes all the templates of nuclei collected from different sources☆18Dec 30, 2022Updated 3 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆78May 16, 2024Updated last year
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆56Feb 2, 2025Updated last year
- Automated Recon Tool Installer☆16Jun 29, 2022Updated 3 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- Passively check for XSS character encodings☆18Mar 1, 2026Updated last week
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆37Feb 27, 2026Updated last week
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆19Jan 24, 2023Updated 3 years ago
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆344Jan 7, 2024Updated 2 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- ☆90Oct 28, 2021Updated 4 years ago
- Tools and methods that I personally use for Recon and Exploitations☆50May 1, 2025Updated 10 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- XSS Payload Cheat Sheet☆11Sep 1, 2024Updated last year
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- ☆13Jun 26, 2025Updated 8 months ago
- ☆12Feb 20, 2025Updated last year
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- ☆34Feb 27, 2026Updated last week