Sandeep Singh
Sandeep Singh
@Nishantbhagat57 thanks for sharing idea, but I think it would be better to re-scan like you are doing it right now i.e re-run the scan instead of re-scanning template X...
@skalvin do you have an example / cmd to share that can be used to reproduce this?
@denandz for non-RFC compliant you can make use of `unsafe: true` that uses https://github.com/projectdiscovery/rawhttp instead of `net/http` Docs: https://docs.projectdiscovery.io/templates/protocols/http/unsafe-http example template: ```yaml id: basic-raw-example info: name: Test RAW Template author:...
Hi @dimitriospapadimas, Thanks for sharing the issue with us, fuzzing feature is introduced recently and have many possibility to improve and bug fixes like this! Feel free to open a...
This should be fixed in latest update - https://github.com/projectdiscovery/nuclei/releases/tag/v3.4.3
@dankegel you can already feed the list as file input or stdin. ```console $ cat id.txt CVE-2024-5274 CVE-2024-4978 CVE-2024-4947 CVE-2024-4761 CVE-2024-4671 ``` ```console $ cvemap -id id.txt ______ _____ ____...
@shargon please include additonal information to replicate this! for example I'm unable to repro this on mac!
Unable to repro this: ``` $ echo AS54115 | asnmap ___ _____ __ / _ | / __/ |/ /_ _ ___ ____ / __ |_\ \/ / ' \/...
@mark-adams this is now included in latest release of tlsx - https://github.com/projectdiscovery/tlsx/releases/tag/v1.1.7
@hatamiarash7, can we append the domain name to the `dns_name` value so that the output contains a usable DNS name for further use? For example, `grafana` would become `grafana.xyz.com`