2025-03-14 21:59:59 -06:00
# nuclei
2025-12-16 10:20:31 -07:00
> Fast and customizable vulnerability scanner using a simple YAML-based DSL.
2025-05-08 12:26:01 -06:00
> More information: <https://docs.projectdiscovery.io/tools/nuclei/running>.
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Update `nuclei` templates to the latest released version (downloaded to `~/nuclei-templates` on macOS/Linux or `%USERPROFILE%\nuclei-templates` on Windows):
2025-03-14 21:59:59 -06:00
2025-05-08 12:26:01 -06:00
`nuclei {{[-ut|-update-templates]}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- [l]ist all [t]emplates by specific [p]rotocol [t]ype:
2025-03-14 21:59:59 -06:00
2025-05-08 12:26:01 -06:00
`nuclei -tl {{[-pt|-type]}} {{dns|file|http|headless|tcp|workflow|ssl|websocket|whois|code|javascript}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Run an automatic web scan using Wappalyzer technology detection for a specific target [u]RL/host:
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-as|-automatic-scan]}} {{[-u|-target]}} {{example.com}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Run HTTP [p]rotocol [t]ype templates of specific severity, exporting results to markdown files inside a specific directory:
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-s|-severity]}} {{high,critical,...}} {{[-pt|-type]}} http {{[-u|-target]}} {{https://example.com}} {{[-me|-markdown-export]}} {{path/to/directory}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Run all templates with a custom rate limit, maximum bulk size, and silent output (only findings shown):
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-rl|-rate-limit]}} {{150}} {{[-bs|-bulk-size]}} {{25}} {{[-c|-concurrency]}} {{25}} -silent {{[-u|-target]}} {{https://example.com}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Run a specific nuclei-bundled workflow against a target:
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-w|-workflows]}} {{workflows/wordpress-workflow.yaml}} {{[-u|-target]}} {{https://example.com}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Run one or more specific templates or directory with templates with verbose output in `stderr` and output detected issues/vulnerabilities to a file:
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-t|-templates]}} {{path/to/nuclei-templates/http}} {{[-u|-target]}} {{https://example.com}} {{[-v|-verbose]}} {{[-o|-output]}} {{path/to/results}}`
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
- Use an AI prompt to dynamically generate a template to scan a target (projectdiscovery cloud pdcp API key needs to be configured using `nuclei -auth` ):
2025-03-14 21:59:59 -06:00
2025-12-16 10:20:31 -07:00
`nuclei {{[-u|-target]}} {{https://example.com}} {{[-ai|-prompt]}} "{{find admin login endpoints}}"`