From f8740daa3318ae65d75127f16f95c778c8fedf14 Mon Sep 17 00:00:00 2001 From: Managor <42655600+Managor@users.noreply.github.com> Date: Sat, 3 May 2025 11:56:14 +0300 Subject: [PATCH] nuclei: add option placeholders (#16327) * Update nuclei.md * Update pages/common/nuclei.md Co-authored-by: Machiavelli <145562237+MachiavelliII@users.noreply.github.com> * Update pages/common/nuclei.md Co-authored-by: Machiavelli <145562237+MachiavelliII@users.noreply.github.com> --------- Co-authored-by: Machiavelli <145562237+MachiavelliII@users.noreply.github.com> --- pages/common/nuclei.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/pages/common/nuclei.md b/pages/common/nuclei.md index f172b80d15..679e3b4de2 100644 --- a/pages/common/nuclei.md +++ b/pages/common/nuclei.md @@ -1,36 +1,36 @@ # nuclei > Fast and customizable vulnerability scanner based on a simple YAML based DSL. -> More information: . +> More information: . - [u]pdate `nuclei` [t]emplates to the latest released version (will be downloaded to `~/nuclei-templates`): -`nuclei -ut` +`nuclei {{[-ut|-update-templates]}}` - [l]ist all [t]emplates with a specific [p]rotocol [t]ype: -`nuclei -tl -pt {{dns|file|http|headless|tcp|workflow|ssl|websocket|whois|code|javascript}}` +`nuclei -tl {{[-pt|-type]}} {{dns|file|http|headless|tcp|workflow|ssl|websocket|whois|code|javascript}}` - Run an [a]utomatic web [s]can using wappalyzer technology detection specifying a target [u]RL/host to scan: -`nuclei -as -u {{scanme.nmap.org}}` +`nuclei {{[-as|-automatic-scan]}} {{[-u|-target]}} {{scanme.nmap.org}}` - Run HTTP [p]rotocol [t]ype templates of high and critical severity, [e]xporting results to [m]arkdown files inside a specific directory: -`nuclei -severity high,critical -pt http -u {{http://scanme.sh}} -me {{markdown_directory}}` +`nuclei {{[-s|-severity]}} high,critical {{[-pt|-type]}} http {{[-u|-target]}} {{http://scanme.sh}} {{[-me|-markdown-export]}} {{markdown_directory}}` - Run all templates using a different [r]ate [l]imit and maximum [b]ulk [s]ize with silent output (only showing the findings): -`nuclei -rl {{150}} -bs {{25}} -c {{25}} -silent -u {{http://scanme.sh}}` +`nuclei {{[-rl|-rate-limit]}} {{150}} {{[-bs|-bulk-size]}} {{25}} {{[-c|-concurrency]}} {{25}} -silent {{[-u|-target]}} {{http://scanme.sh}}` - Run the WordPress [w]orkflow against a WordPress site: -`nuclei -w {{path/to/nuclei-templates/workflows/wordpress-workflow.yaml}} -u {{https://sample.wordpress.site}}` +`nuclei {{[-w|-workflows]}} {{path/to/nuclei-templates/workflows/wordpress-workflow.yaml}} {{[-u|-target]}} {{https://sample.wordpress.site}}` - Run one or more specific [t]emplates or directory with [t]emplates with [v]erbose output in `stderr` and [o]utput detected issues/vulnerabilities to a file: -`nuclei -t {{path/to/nuclei-templates/http}} -u {{http://scanme.sh}} -v -o {{results}}` +`nuclei {{[-t|-templates]}} {{path/to/nuclei-templates/http}} {{[-u|-target]}} {{http://scanme.sh}} {{[-v|-verbose]}} {{[-o|-output]}} {{results}}` - Run scan based on one or more [t]emplate [c]onditions: -`nuclei -tc "{{contains(tags, 'xss') && contains(tags, 'cve')}}" -u {{https://vulnerable.website}}` +`nuclei {{[-tc|-template-condition]}} "{{contains(tags, 'xss') && contains(tags, 'cve')}}" {{[-u|-target]}} {{https://vulnerable.website}}`