Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion cloud/free/overview.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ To get started with PDCP Free you'll need two things:
- Scan results from Nuclei
- a PDCP Login/Setup

If you already have Nuclei scan results, or you've walked through our [Getting Started example](/getstarted-overview) using Nuclei, you're most of the way there.
If you already have Nuclei scan results, or you've walked through our [Getting Started example](/quickstart) using Nuclei, you're most of the way there.

## What's in this User Guide?

Expand Down
2 changes: 1 addition & 1 deletion opensource/nuclei/overview.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Nuclei Overview
description: "A fast and customisable vulnerability scanner powered by simple YAML-based templates"

Check warning on line 3 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L3

Did you really mean 'customisable'?
sidebarTitle: Overview
---

Expand All @@ -12,9 +12,9 @@

Each template delineates a possible attack route, detailing the vulnerability, its severity, priority rating, and occasionally associated exploits. This template-centric methodology ensures Nuclei not only identifies potential threats, but pinpoints exploitable vulnerabilities with tangible real-world implications.

New to scanners and Nuclei? Try it out today with a quick example through our [Getting Started](/getstarted-overview).
New to scanners and Nuclei? Try it out today with a quick example through our [Getting Started](/quickstart).

## What are Nuclei's features?

Check warning on line 17 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L17

Did you really mean 'Nuclei's'?

| Feature | Description |
| --------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
Expand All @@ -26,8 +26,8 @@
| [Comprehensive Reporting `cloud`](#) | Generates detailed reports with actionable insights, including vulnerability details, severity levels, affected endpoints, and suggested remediation steps. |
| [Integration with CI/CD Pipelines](/opensource/nuclei/ci-cd) | Seamlessly integrate Nuclei into CI/CD pipelines for automated security testing as part of the development and deployment process. |
| [CI/CD Integration `cloud`](#) | Actively maintained and developed by the ProjectDiscovery team, introducing new features, bug fixes, and enhancements to provide an up-to-date scanning framework. |
| [Ticketing integration `cloud`](#) | Two-way ticketing integration with Jira, Splunk, and many others to easily remediate and retest vulnerabilities. |

Check warning on line 29 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L29

Did you really mean 'Jira'?

Check warning on line 29 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L29

Did you really mean 'Splunk'?
| [Customizable Output Format](#) | Configure the output format of Nuclei's scan results to suit your needs, including options for JSON, YAML, and more. |

Check warning on line 30 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L30

Did you really mean 'Nuclei's'?
| [Dynamic Variables](#) | Utilize dynamic variables in templates to perform parameterized scanning, enabling versatile and flexible scanning configurations. |
| [Inclusion and Exclusion Filters](#) | Apply inclusion and exclusion filters to specify targets, reducing scanning scope and focusing on specific areas of interest. |
| [Authentication Support](/opensource/nuclei/authenticated-scans) | Nuclei supports various authentication mechanisms, including HTTP basic authentication, JWT token authentication, and more. |
Expand All @@ -39,20 +39,20 @@

The global security community, including numerous researchers and engineers, actively contributes to the Nuclei template ecosystem. With over 6500 templates contributed thus far, Nuclei is continuously updated with real-world exploits and cutting-edge attack vectors.

Nuclei templates support scanning for critical issues such as the Log4j vulnerability and RCEs that impact vendors such as GitLab, Cisco, F5, and many others. Nuclei has dozens of use cases, including:

Check warning on line 42 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L42

Did you really mean 'RCEs'?

| Use Case | Description |
| ------------------------------------------ | --------------------------------------------------------------------------------------------- |
| Web Application Security | Identifies common web vulnerabilities with community-powered templates. |
| Infrastructure Security | Audits server configurations, open ports, and insecure services for security issues. |
| API Security Testing `alpha` | Tests APIs against known vulnerabilities and misconfigurations. |

Check warning on line 48 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L48

Did you really mean 'misconfigurations'?
| (CI/CD) Security | Integrates into CI/CD pipelines to minimize vulnerability resurface into production. |
| Third-party Vendor Assessment | Evaluates the security of third-party vendors by scanning their digital assets. |
| Cloud Security `alpha` | Scans cloud environments for misconfigurations and vulnerabilities. |

Check warning on line 51 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L51

Did you really mean 'misconfigurations'?
| Mobile Application Security | Scans mobile applications for security issues, including API tests and configuration checks. |
| Network Device Security `alpha` | Identifies vulnerabilities in network devices like routers, switches, and firewalls. |
| Web Server Assessment | Identifies common vulnerabilities and misconfigurations in web servers. |

Check warning on line 54 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L54

Did you really mean 'misconfigurations'?
| Content Management System (CMS) Assessment | Identifies vulnerabilities specific to CMS platforms like WordPress, Joomla, or Drupal. |

Check warning on line 55 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L55

Did you really mean 'Joomla'?
| Database Security Assessment | Scans databases for known vulnerabilities, default configurations, and access control issues. |

## Who is Nuclei for?
Expand All @@ -62,7 +62,7 @@
- **Security Engineers/Analysts**: Conduct security assessments, proactively identify vulnerabilities, convert custom vectors and analyze latest attack vectors.
- **Red Teams**: Leverage Nuclei as part of their offensive security operations to simulate real-world attack scenarios, identify weaknesses, and provide actionable recommendations for enhancing overall security.
- **DevOps Teams**: Integrate Nuclei into their CI/CD pipelines to ensure continuous security and regression of custom vulnerabilities.
- **Bug Bounty Hunters**: Leverage Nuclei to find vulnerabilities across their programs listed on platforms like HackerOne, Bugcrowd, Intigriti etc.

Check warning on line 65 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L65

Did you really mean 'Bugcrowd'?

Check warning on line 65 in opensource/nuclei/overview.mdx

View check run for this annotation

Mintlify / Mintlify Validation (projectdiscovery) - vale-spellcheck

opensource/nuclei/overview.mdx#L65

Did you really mean 'Intigriti'?
- **Penetration Testers**: Utilize Nuclei to automate their assessment methodologies into templates for their clients' systems.

### Security Engineers
Expand Down
Loading