Skip to content

Releases: projectdiscovery/nuclei

v3.3.2

04 Sep 14:19
96203d8
Compare
Choose a tag to compare

What's Changed

🎉 New Features

  • Added ActionWaitDialog type in headless protocol to simplify XSS detection by @dwisiswant0 in #5545

See docs for more details.

🔨 Maintenance

⚠️ Security

See GitHub security advisories for detailed information.

Other Changes

New Contributors

Full Changelog: v3.3.1...v3.3.2

v3.3.1

16 Aug 15:17
8c0dd5f
Compare
Choose a tag to compare

What's Changed

🎉 New Features

Option:

   -tid, -team-id string  upload scan results to given team id (optional) (default "none")

Example:

nuclei -pt dns -u example.com -cloud-upload -team-id cqlmoalcm2sc73eut1b0

Option:

   -rd, -redact string[]  redact given list of keys from query parameter, request header and body

Example:

nuclei -pt dns -u example.com -redact api_key,x-api-key,user-agent

🐞 Bug Fixes

🔨 Maintenance

Issues closed in this release - https://github.com/projectdiscovery/nuclei/milestone/61?closed=1

New Contributors

Full Changelog: v3.3.0...v3.3.1

v3.3.0

17 Jul 14:26
bac9174
Compare
Choose a tag to compare

What's Changed

🐞 Bug Fixes

Other Changes

Caution

In this release, with the changes in #5228, the following options have been removed from the CLI. They are now configured implicitly and can be customized via SDK usage.

 -dt, -dialer-timeout value  timeout for network requests.
 -rrt, -response-read-timeout value  response read timeout in seconds (default 5s)

New Contributors

Full Changelog: v3.2.9...v3.3.0

v3.2.9

16 Jun 14:53
Compare
Choose a tag to compare

What's Changed

🎉 New Features

  • Fuzzing feature enhancements by @Ice3man543 in #5139
    • Added part: request to fuzz all the keys in request with fuzzing templates.
    • Added -fuzz-aggression CLI option to control fuzz aggression via template.
    • Added -fuzz-param-frequency option to control counter for skipping uninteresting parameter.
    • Added -display-fuzz-points option to display fuzzing points (for debugging).
  • PDCP Team ID input support via environment variable to upload results into team account by @tarunKoyalwar in #5295
export PDCP_TEAM_ID=cphlrbmnr2khg33n6ik1

Note

Team ID is optional input and can be obtained from https://cloud.projectdiscovery.io/settings/team. If provided, results will be uploaded to the team account instead of your personal account.

🐞 Bug Fixes

Other Changes

New Contributors

Full Changelog: v3.2.8...v3.2.9

v3.2.8

24 May 22:44
Compare
Choose a tag to compare

What's Changed

🐞 Bug Fixes

Issues closed in release - https://github.com/projectdiscovery/nuclei/milestone/58?closed=1

Full Changelog: v3.2.7...v3.2.8

v3.2.7

10 May 19:35
Compare
Choose a tag to compare

What's Changed

🎉 New Features

   -sname, -scan-name string  scan name to set (optional)

🐞 Bug Fixes

Other Changes

Full Changelog: v3.2.6...v3.2.7

v3.2.6

04 May 19:50
Compare
Choose a tag to compare

What's Changed

$ ./nuclei -tpl

profiles/aws-cloud-config.yml (aws-cloud-config)
profiles/bugbounty.yml (bugbounty)
profiles/cloud.yml (cloud)
profiles/compliance.yml (compliance)
profiles/osint.yml (osint)
profiles/pentest.yml (pentest)
profiles/privilege-escalation.yml (privilege-escalation)
profiles/recommended.yml (recommended)
$ ./nuclei -profile aws-cloud-config
$ ./nuclei -silent -tgl | head -n 10

cve (2416)
panel (1122)
wordpress (956)
exposure (895)
xss (890)
wp-plugin (836)
osint (804)
tech (673)
lfi (646)
misconfig (598)

New Contributors

Full Changelog: v3.2.5...v3.2.6

v3.2.5

25 Apr 13:07
Compare
Choose a tag to compare

What's Changed

🎉 New Features

🐞 Bug Fixes

Issues closed in this release - https://github.com/projectdiscovery/nuclei/milestone/55?closed=1

New Contributors

Full Changelog: v3.2.4...v3.2.5

v3.2.4

08 Apr 21:31
39b6ca9
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v3.2.3...v3.2.4

v3.2.3

03 Apr 16:34
9957003
Compare
Choose a tag to compare

Important

Nuclei Templates for dynamic application security testing (DAST), which were maintained in a separate project at fuzzing-templates, are now being moved to the nuclei-templates project. This way, they can be made available for use with the default nuclei installation with the upcoming release of the template project. These templates will be disabled as default but can be used with the -dast option.

More information of fuzzing support: https://blog.projectdiscovery.io/nuclei-fuzzing-for-unknown-vulnerabilities/

What's Changed

New Contributors

Full Changelog: v3.2.2...v3.2.3