explaingit

projectdiscovery/nuclei

📈 Trending28,245GoAudience · ops devopsComplexity · 3/5ActiveLicenseSetup · easy

TLDR

Fast, open-source vulnerability scanner that uses YAML templates to automatically check websites, APIs, and cloud configs for security weaknesses.

Mindmap

mindmap
  root((Nuclei))
    What it does
      Scans for vulnerabilities
      Confirms real exploits
      Runs in parallel
    How it works
      YAML detection templates
      Community template library
      Multiple protocols
    Use cases
      Infrastructure security checks
      Penetration testing
      CI/CD pipeline integration
    Tech stack
      Go language
      Command-line tool
      Cloud editions available
    Audience
      Security researchers
      DevOps teams
      Developers

Things people build with this

USE CASE 1

Automatically scan your production servers and APIs for known vulnerabilities on a regular schedule.

USE CASE 2

Run penetration tests against your infrastructure to find security weaknesses before attackers do.

USE CASE 3

Integrate security checks into your CI/CD pipeline so every code deployment is automatically scanned for vulnerabilities.

USE CASE 4

Create custom YAML templates to detect vulnerabilities specific to your organization's tech stack.

Tech stack

GoYAMLHTTPDNSTCPSSL

Getting it running

Difficulty · easy Time to first run · 5min
Open-source tool available under a permissive license allowing free use for security scanning and vulnerability detection.

In plain English

Nuclei is a vulnerability scanner: a tool that probes websites, APIs, networks, DNS configurations, and cloud setups looking for known security weaknesses. What distinguishes it from a generic scanner is that the checks themselves are not hard-coded inside the program. Each check is written as a short YAML file, called a template, that describes exactly what request to send and what response would indicate a vulnerability. YAML is just a plain-text format for structured data, easy to read and edit. Because templates are simple files, a global community of security professionals contributes them, and the project says this approach is designed to produce zero false positives by mimicking the real steps an attacker would take. In practice you point Nuclei at one URL, a list of targets, or a network address, and it runs many templates in parallel, grouping similar requests together for speed. It supports a wide range of protocols including HTTP, TCP, DNS, SSL, WHOIS, and embedded JavaScript and code execution checks. A separate, community-maintained library of templates ships alongside the scanner, and the tool can be plugged into continuous integration pipelines so the same checks run automatically on every code change. Findings can be sent on to Jira, Splunk, GitHub, Elastic, and GitLab. This is the kind of tool a penetration tester, security team, or developer would reach for when they need to repeatedly check a stack of services for known issues. Nuclei is a command-line program written in Go, and the project also offers a paid cloud edition with team features. The full README is longer than what was provided.

Copy-paste prompts

Prompt 1
How do I set up Nuclei to scan my website for common vulnerabilities like SQL injection and XSS?
Prompt 2
Show me how to write a custom YAML template in Nuclei to detect a specific vulnerability in my application.
Prompt 3
How can I integrate Nuclei into my GitHub Actions workflow to automatically scan for vulnerabilities on every pull request?
Prompt 4
What's the difference between Nuclei's community templates and creating my own custom detection rules?
Prompt 5
How do I use Nuclei to run a penetration test against my API endpoints and generate a report?
Open on GitHub → Explain another repo

Generated 2026-05-21 · Model: sonnet-4-6 · Verify against the repo before relying on details.