Community curated list of templates for the nuclei engine to find security vulnerabilities.
☆26Apr 10, 2026Updated last month
Alternatives and similar repositories for nuclei-templates
Users that are interested in nuclei-templates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆64Jul 7, 2024Updated last year
- ☆47May 31, 2024Updated last year
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CosmicSting (CVE-2024-34102)☆48Sep 5, 2024Updated last year
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆18Oct 30, 2025Updated 6 months ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- WordPress Elementor 3.6.0 3.6.1 3.6.2 RCE POC☆16Apr 17, 2022Updated 4 years ago
- ☆25Jan 15, 2024Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- ☆17May 27, 2023Updated 2 years ago
- ☆188Mar 14, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆27May 2, 2026Updated last week
- Url scrapper or extractor from alienvault☆39Mar 1, 2025Updated last year
- ☆29May 22, 2024Updated last year
- A powerful asynchronous XSS scanner supporting up to 1,500 concurrent requests.☆171Aug 16, 2024Updated last year
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆26Nov 15, 2024Updated last year
- ☆17Sep 15, 2023Updated 2 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆50Apr 27, 2023Updated 3 years ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆52Dec 7, 2023Updated 2 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Develop macOS apps on Windows with seamless cross-platform tools.☆16Jun 5, 2025Updated 11 months ago
- N0aziXss Origin Recon 🍓☆23Dec 16, 2025Updated 4 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner☆17Sep 26, 2024Updated last year
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆15May 15, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆39Feb 9, 2025Updated last year
- Go scanner to find web cache poisoning vulnerabilities in a list of URLs☆148Feb 21, 2024Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- ☆16Mar 17, 2025Updated last year
- Anti-forensics tool Inspired by NSA's Marble framework.☆10Apr 17, 2025Updated last year
- ☆30Jul 5, 2023Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆20Jun 6, 2024Updated last year