Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xkayala/nucleifuzzer
NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications
https://github.com/0xkayala/nucleifuzzer
fuzzing-templates nuclei nuclei-templates nucleifuzzer
Last synced: about 1 month ago
JSON representation
NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications
- Host: GitHub
- URL: https://github.com/0xkayala/nucleifuzzer
- Owner: 0xKayala
- Created: 2023-05-22T16:21:15.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-09-16T09:47:33.000Z (about 2 months ago)
- Last Synced: 2024-10-09T14:21:31.150Z (about 1 month ago)
- Topics: fuzzing-templates, nuclei, nuclei-templates, nucleifuzzer
- Language: Shell
- Homepage: https://github.com/0xKayala/NucleiFuzzer
- Size: 121 KB
- Stars: 1,267
- Watchers: 15
- Forks: 191
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
README
NucleiFuzzer = Nuclei + Paramspider
`NucleiFuzzer` is an automation tool that combines `ParamSpider` and `Nuclei` to enhance web application security testing. It uses `ParamSpider` to identify potential entry points and `Nuclei` fuzzing templates to scan for vulnerabilities. `NucleiFuzzer` streamlines the process, making it easier for security professionals and web developers to detect and address security risks efficiently. Download `NucleiFuzzer` to protect your web applications from vulnerabilities and attacks.
**Note:** `Nuclei` + `Paramspider` = `NucleiFuzzer`
**Important:** Make sure the tools `Nuclei`, `httpx` & `Paramspider` are installed on your machine and executing correctly to use the `NucleiFuzzer` without any issues.### Tools included:
[ParamSpider](https://github.com/0xKayala/ParamSpider) `git clone https://github.com/0xKayala/ParamSpider.git`
[Nuclei](https://github.com/projectdiscovery/nuclei) `git clone https://github.com/projectdiscovery/nuclei.git`### Templates:
[Fuzzing Templates](https://github.com/0xKayala/fuzzing-templates) `git clone https://github.com/0xKayala/fuzzing-templates.git`## Screenshot
![image](https://github.com/0xKayala/NucleiFuzzer/assets/16838353/d29d18e2-e5b4-4f5f-b1fd-351167fa7c31)## Output
![image](https://github.com/0xKayala/NucleiFuzzer/assets/16838353/16c8eac9-6924-4196-ae71-70e98057e47c)
![image](https://github.com/0xKayala/NucleiFuzzer/assets/16838353/2b204838-d3ed-4408-9920-ba99a9c528a2)
![image](https://github.com/0xKayala/NucleiFuzzer/assets/16838353/22943a3d-7fde-4d6b-a84a-62dc9793bdbc)
![image](https://github.com/0xKayala/NucleiFuzzer/assets/16838353/304f8113-6b65-4ae8-8d23-34bcee750b73)## Usage
```sh
nf -h
```This will display help for the tool. Here are the options it supports.
```console
NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc. vulnerabilities in Web ApplicationsUsage: /usr/bin/nf [options]
Options:
-h, --help Display help information
-d, --domain Domain to scan for XSS, SQLi, SSRF, Open-Redirect..etc vulnerabilities
-f, --file File containing multiple domains/URLs to scan
```## Installation:
To install `NucleiFuzzer`, follow these steps:
```
git clone https://github.com/0xKayala/NucleiFuzzer.git && cd NucleiFuzzer && sudo chmod +x install.sh && ./install.sh && nf -h && cd ..
```## Examples:
Here are a few examples of how to use NucleiFuzzer:
- Run `NucleiFuzzer` on a single domain:
```sh
nf -d example.com
```- Run `NucleiFuzzer` on multiple domains from a file:
```sh
nf -f file.txt
```## Practical Demonstration:
For a Practical Demonstration of the NucleiFuzzer tool see the below video 👇
[](https://www.youtube.com/embed/2K2gTCHt6kg)
## Star History
[![Star History Chart](https://api.star-history.com/svg?repos=0xKayala/NucleiFuzzer&type=Date)](https://star-history.com/#0xKayala/NucleiFuzzer&Date)
## Contributing
Contributions are welcome! If you'd like to contribute to `NucleiFuzzer`, please follow these steps:
1. Fork the repository.
2. Create a new branch.
3. Make your changes and commit them.
4. Submit a pull request.Made by
`Satya Prakash` | `0xKayala` \A `Security Researcher` and `Bug Hunter` \
## Connect with me:
## Support me: