
Info
This page is place where I store command, configuration and moreover around information security.
Nuclei
Info
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Github and Documentation
Install nuclei
For install nuclei, you need to make sure your host installed golang, that is the fastest way to help you install nuclei for your host
go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latestOr you can try to install binary version from release page of nuclei
wget https://github.com/projectdiscovery/nuclei/releases/download/v3.3.0/nuclei_3.3.0_linux_amd64.zip
mkdir -p nuclei_unzip
unzip -d nuclei_unzip nuclei_3.3.0_linux_amd64.zip
sudo mv ./nuclei_unzip/nuclei /usr/local/bin
rm -rf nuclei_unzip nuclei_3.3.0_linux_amd64.zipSetup nuclei-templates for default
Info
I will become useful to cut off or you want specific your
nuclei-templatesand update that to become default templates ofnucleion run and target
nuclei -update-template-dir /path/to/your/nuclei-templates/Specific template and tags for scan with sort of endpoints
nuclei -tags lfi,ssrf,rce -t dast/vulnerabilities/ -l targets.txtRun nuclei with android app
With android platform, when you try to pentest this platforms, you will need bunch of tools to help you handle
- apktool : A tool for reverse engineering Android apk files
- mobile-nuclei-templates :
nuclei-templatesfor mobile platforms
First of all, you need to reverse your apk to metadata and information include inside this target with apktool
java -jar apktool_2.9.3.jar d /path/to/apk -o /path/to/output_apktoolNow you can use nuclei to perform scanning inside output of apktool
# NOTE: Install mobile nuclei template with mobile inside your default nuclei-templates location
echo /path/to/output_apktool | nuclei -t mobile/