Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
⚛️ Nuclei AI — Browser Extension
Nuclei AI Browser Extension, built on top of cloud.projectdiscovery.io, simplifies the creation of vulnerability templates, by enabling users to extract vulnerability information from any webpages to quickly and efficiently create nuclei templates, saving valuable time and effort.
🚀 Features
— Context Menu Option to Generate Template
— HackerOne Report to Nuclei Template Generation
— ExploitDB exploit to Nuclei Template Generation
— BugCrowd / Intigriti / Synack support (Coming soon)
🔗 https://github.com/projectdiscovery/nuclei-ai-extension
#nuclei #template #generator #chrome #extension
Nuclei AI Browser Extension, built on top of cloud.projectdiscovery.io, simplifies the creation of vulnerability templates, by enabling users to extract vulnerability information from any webpages to quickly and efficiently create nuclei templates, saving valuable time and effort.
🚀 Features
— Context Menu Option to Generate Template
— HackerOne Report to Nuclei Template Generation
— ExploitDB exploit to Nuclei Template Generation
— BugCrowd / Intigriti / Synack support (Coming soon)
🔗 https://github.com/projectdiscovery/nuclei-ai-extension
#nuclei #template #generator #chrome #extension
Темплейты нуклея обновились и было добавлено 25 новых CVEs:
🔥 Apache ActiveMQ - Remote Code Execution [critical]
🔥 CrushFTP < 10.5.1 - Unauthenticated Remote Code Execution [critical]
🔥 Apache OFBiz < 18.12.10 - Arbitrary Code Execution [critical]
🔥 Qlik Sense Enterprise - HTTP Request Smuggling [critical]
🔥 ZoneMinder Snapshots - Command Injection [critical]
🔥 Chamilo LMS <= v1.11.20 Unauth Command Injection [critical]
🔥 Worpress Backup Migration <= 1.3.7 - Unauth Remote Code Execution [critical]
Проверять обновления можно командой:
#Nuclei #BugBounty
🔥 Apache ActiveMQ - Remote Code Execution [critical]
🔥 CrushFTP < 10.5.1 - Unauthenticated Remote Code Execution [critical]
🔥 Apache OFBiz < 18.12.10 - Arbitrary Code Execution [critical]
🔥 Qlik Sense Enterprise - HTTP Request Smuggling [critical]
🔥 ZoneMinder Snapshots - Command Injection [critical]
🔥 Chamilo LMS <= v1.11.20 Unauth Command Injection [critical]
🔥 Worpress Backup Migration <= 1.3.7 - Unauth Remote Code Execution [critical]
Проверять обновления можно командой:
nuclei -nt -severity critical --vv
#Nuclei #BugBounty