Last week nuclei was uptated to v3. This is a summary of the Nuclei v3 new features: Project discovery blog post with the full description can be found here: https://blog.projectdiscovery.io/nuclei-v3-featurefusion/ Note: By the time I uploaded my systems it has been released Nuclei v3.0.1 fixing some issues introduced with v3.0The full changelog can be checked here: https://github.com/projectdiscovery/nuclei/compare/v3.0.0…v3.0.1 $ nuclei –up $ nuclei –version
Introduction: Last week, a critical security vulnerability, identified as CVE-2023-37896, surfaced within the Nuclei project – a potent vulnerability scanner renowned for pinpointing security weaknesses. In this comprehensive blog post, we delve into the intricacies of this vulnerability, discuss its potential implications, and outline the steps users must take to safeguard their systems. Understanding the Vulnerability: The vulnerability, formally designated as CVE-2023-37896, casts a shadow over Nuclei versions predating 2.9.9.
Nuclei is a vulnerability scanner tool from ProjectDiscovery. Using a template system, Nuclei becomes an extensible and highly configurable application that can be very helpful in pentests or bug bounty processes. In this first post, I’ll show how to install Nuclei in a Kali Linux inside a MacBook Pro with the new M1 Pro CPU. Kali Linux is installed using a VMware Fusion for Apple Silicon beta version. More info can be