Running into an error while writing a Nuclei template? Here's a simple way to fix them.👇
ProjectDiscovery
Computer and Network Security
San Francisco, California 18,628 followers
We detect real vulnerabilities with zero noise. Powered by Nuclei for fast, attacker-like detections. Request a demo!
About us
ProjectDiscovery helps security teams detect real, exploitable vulnerabilities without the noise. We combine open source power with enterprise-grade scale, starting with Nuclei, our fast, customizable vulnerability scanner trusted by thousands of engineers. Nuclei delivers attacker-like detections using conditional logic, enabling teams to move beyond version matching and catch what truly matters. Trusted by teams at Elastic, Vercel, and thousands more, ProjectDiscovery brings open-source flexibility to enterprise workflows, enabling full visibility and faster remediation in minutes with zero setup friction. Start with Nuclei. Scale with ProjectDiscovery.
- Website
-
https://projectdiscovery.io
External link for ProjectDiscovery
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- San Francisco, California
- Type
- Privately Held
- Founded
- 2020
- Specialties
- Attack Surface Management, Vulnerability Detection, Automated Security Workflows, Remediation, and Application Security
Locations
-
Primary
Get directions
548 Market St
San Francisco, California 94104, US
Employees at ProjectDiscovery
-
Hemant Mohapatra
Partner, Lightspeed; past: @a16z, @Google, engineering @AMD
-
Chad M.
Early Stage/High Growth CRO, Angel Investor and Sales Advisor helping early stage founders take their product to market and drive sustainable…
-
Robin Vasan
Enterprise Software Seed Investor
-
Daniel Miessler 🛡️
Building AI that upgrades humans and organizations. [SECURITY | AI | PURPOSE]
Updates
-
Are you the kind of bug bounty hunter people want to work with? 4 Essentials to build your reputation: ✅Get Permission ✅Stay in Scope ✅Be Transparent ✅Take Your Time Read the full blog to learn the 4 essentials of good bug bounty etiquette👇 https://lnkd.in/g9HS9HUs
-
Need to confirm a vulnerability in Nuclei? Meet Analyzers!🤝 This is a concept introduced in Nuclei fuzzing that allows the engine to make additional verification requests, based on a specific logic, to confirm a vulnerability. Watch this video to see how they work👇
ProjectDiscovery Tips and Tricks - Analyzer!
https://www.youtube.com/
-
Uncover helps you quickly find exposed hosts and vulnerabilities on the internet by leveraging multiple internet-based search engines. Here are the key problems Uncover solves: 🌀 Streamlines Internet-wide Host Discovery Uncover consolidates the process of querying different search engines like Shodan, Censys, and FOFA into a single command. This eliminates the need to use separate tools or manually visit different websites, allowing you to quickly map a wide range of internet-connected devices. 🌀 Simplifies Automation Built with automation in mind, Uncover supports standard input/output (stdin/stdout), allowing you to easily pipe its results to other security tools like httpx and Nuclei. This means you can create a simple, automated workflow to discover assets, probe for active services, and then scan them for vulnerabilities. 🌀 Manages API Keys Efficiently The tool simplifies managing multiple API keys for different search engines. You can store all your keys in a single configuration file or set them as environment variables. This feature is particularly useful for users who need to switch between different keys or services for more comprehensive data. 🌀 Provides Flexible Querying Uncover offers various querying options. You can use a single query across multiple search engines, perform multiple queries at once, or even use specific dorks to find exactly what you're looking for. It also includes "field formatting" to customize the output, so you can get results in the format you need for your automation pipelines. Ready to find exposed hosts and vulnerabilities on the internet? Read the full article to learn more 👇
-
Do you know about Nuclei Matchers? Matchers allow for flexible comparisons on protocol responses.👇 Check out our Github: https://lnkd.in/g2ZPY-eV
-
Nuclei templates can be considered the universal language for communicating vulnerabilities due to their streamlined, open-source, and actionable format: 🌀Standardized Details: Templates combine all essential vulnerability information (severity, detection logic, references) into one concise package. This provides immediate, consistent context regardless of the user's language or company. 🌀Actionable Code: They contain a finite set of requests and matchers that function as code-as-vulnerability-definition. This allows security teams to instantly run the check against assets, answering "Are we vulnerable?" much faster than waiting for vendor reports. 🌀Community Transparency: The open-source nature means the detection logic is transparent and constantly refined by a global community. This accelerates threat response and validation, making the information trustworthy and current. In essence, the template's simple, structured code is the most effective way to share security intelligence across the industry. To learn more about this shift, read the complete blog post 👇 (🔗 in the comments)
-
-
Shai-Hulud 2.0 supply chain attack compromises 700+ npm packages from Zapier, Postman & more exfiltrating secrets from 25K+ repos! We've added a Nuclei template to detect it in your codebase. Secure your chain: https://lnkd.in/g_nSJj8p #Nuclei #supplychainsecurity
-
-
Did you know over 900 unique contributors are driving the world of internet security? The Nuclei Community Templates Leaderboard showcases the huge impact open source has on the industry. It's designed to recognize the tireless work of these contributors. Watch the video to see what it's all about and what you can get from it 👇
ProjectDiscovery Tips and Tricks - Nuclei Templates Leaderboard!
https://www.youtube.com/