NucleiFuzzer = Nuclei + Paramspider
NucleiFuzzer
is an automation tool that combines ParamSpider
and Nuclei
to enhance web application security testing. It uses ParamSpider
to identify potential entry points and Nuclei's
templates to scan for vulnerabilities. NucleiFuzzer
streamlines the process, making it easier for security professionals and web developers to detect and address security risks efficiently. Download NucleiFuzzer
to protect your web applications from vulnerabilities and attacks.
Note: Nuclei
+ Paramspider
= NucleiFuzzer
Important: Make sure the tools Nuclei
, httpx
& Paramspider
are installed on your machine and executing correctly to use the NucleiFuzzer
without any issues.
Tools included:
ParamSpider git clone https://github.com/0xKayala/ParamSpider.git
Nuclei git clone https://github.com/projectdiscovery/nuclei.git
Templates:
Fuzzing Templates git clone https://github.com/0xKayala/fuzzing-templates.git
Screenshot
Output
Usage
nf -h
This will display help for the tool. Here are the options it supports.
NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc. vulnerabilities in Web Applications
Usage: /usr/local/bin/nf [options]
Options:
-h, --help Display help information
-d, --domain <domain> Domain to scan for XSS, SQLi, SSRF, Open-Redirect..etc vulnerabilities
-f, --file <filename> File containing multiple domains/URLs to scan
Steps to Install:
- git clone https://github.com/0xKayala/NucleiFuzzer.git
- cd NucleiFuzzer
- sudo chmod +x install.sh
- ./install.sh
- nf -h
Practical Demonstration:
For a Practical Demonstration of the NucleiFuzzer tool see the below video 👇
Made by
Satya Prakash
| 0xKayala
\
A Security Researcher
and Bug Hunter
\