#projectdiscovery

🦠Toxic Flange (Gurjeet)🔬⚱️🌚Toxic_Flange@infosec.exchange
2025-03-14

Has anyone used #projectdiscovery suite, or developed Nuclei templates?

How well does it work compared to other tools like Greenbone or some other similar scanning suites?

It looks.. cumbersome and tech-debt-y full of kludges. I definitely couldn't make anything better or maybe at all, so props for that, however I can see it being a problem in the future, and its weird limitations.

#infosec

Wiz :verified:wiz@infosec.exchange
2025-01-03

🚨 Wiz uncovered CVE-2024-43405, a bypass in #Nuclei enabling code execution. Fixed with #ProjectDiscovery. Update to v3.3.2+, Run tools in isolated environments!

wiz.io/blog/nuclei-signature-v

MassivelyOPmassivelyop
2024-04-03
2024-02-05

Cvemap from ProjectDiscovery
Introduction

Cvemap is a new tool developed by Project Discovery to deliver a structured and easily navigable interface to Common Vulnerabilities and Exposures (CVEs) within multiple databases.

It takes a comprehensive approach to prioritize CVEs, moving beyond the usual Common Vulnerability Scoring System (CVSS) score. It looks at
rffuste.com/2024/02/05/cvemap-
#General #Tutoriales #cve #cvemap #projectDiscovery #tools

SΛNJΛYMENØNsanjaymenon
2024-01-24

CVEmap

A command-line interface (CLI) tool designed to provide a structured and easily navigable interface to various vulnerability databases

blog.projectdiscovery.io/annou

2023-10-29

Looks like the good folks at Project Discovery have implemented the full F5 RCE attack chain in a Nuclei Template already. That didn't take long at all, I suspect we'll be posting the rest of the blog this week.

github.com/projectdiscovery/nu

#CVE202346747 #f5 #nuclei #projectdiscovery

:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:zodmagus@infosec.exchange
2023-09-25

Best Nuclei scan for beginners.

sudo nuclei -u example. com -as

This uses wapalyzer to check what technologies it can detect then automatically choose the tags and templates for you.

#z0ds3c #nuclei #projectdiscovery #webhacking #webscan

2023-09-05

Jag har testat verktyget Katana från Project Discovery som kan spindla/crawla webbsidor. Bra för den som vill analysera attackytan mot en sajt eller webbtjänst penetrationstest.se/katana-fra

#projectdiscovery #katana #bugbounty #bugbountytips @pdiscoveryio

Tedi Heriyantotedi@infosec.exchange
2023-09-02

All ProjectDiscovery Tools explained in 30 minutes: youtube.com/watch?v=cBkfk0VbvL

#pentesting #projectdiscovery

Eden 💀 Chaos WranglerMrs_Skelli@defcon.social
2023-05-10

A few words of advice to those building and contributing to #projectdiscovery / #nuclei

1. Save yourself from making the same mistake I did. Little did I know that Nuclei cares a lot about the difference between .yml and .yaml

Go with .yaml

2. If you're basing your template off of a CVE, make sure you don't need to be authenticated to exploit it :') Kind of makes your template useless. Learned my lesson with #CVE-2023-30777

Regardless, next template I build I'll know better for next time ^_^

2023-03-13

Pdtm by Project Discovery
Project Discovery is an open-source software company that builds tools for cybersecurity.They are under nuclei, subfinder, httpx, katana or naabu.

Recently they have published pdtm.Pdtm is a simple and easy-to-use golang based tool for managing open-source projects from ProjectDiscovery.

Install

go1.19 is required to install successfully pdtm.

$
rffuste.com/2023/03/13/pdtm-by
#Tutoriales #pdtm #projectDiscovery #tools

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst