Nuclei
A fast, template-driven vulnerability scanner with 12,000+ community-maintained detection templates covering CVEs, misconfigurations, and exposures across web, network, and cloud.
Developer
ProjectDiscovery
description Technical Dossier
Nuclei is a template-driven, high-performance vulnerability scanner written in Go, designed to probe modern applications, infrastructure, and networks for exploitable security flaws. At its core, each scan is defined by a YAML template that specifies the protocol to use (HTTP, TCP, DNS, SSL, WebSocket, etc.), the exact requests or probes to send, and the matchers that determine a positive finding. This architecture means detection logic is transparent, auditable, and trivially shareable — security researchers can write a template for a new CVE in minutes and distribute it to thousands of users via the community repository.
The engine is built for speed and scale. Nuclei processes targets in parallel with request clustering and deduplication to avoid redundant network calls, making it practical for scanning large attack surfaces. Templates are organised by severity, protocol, and type (CVE, misconfiguration, exposure, takeover, default-creds, etc.) and can be composed into multi-step workflows that chain probes together, supporting complex exploit chains or authenticated scan sequences with JWT, API key, or basic auth credential injection.
What makes Nuclei stand out is the combination of community velocity and engineering rigour. The template library is the most actively maintained open detection corpus in the industry, with a formal bounty program incentivising researchers to contribute templates for newly disclosed vulnerabilities — often within hours of a CVE publication. Because templates reproduce actual attacker behaviour rather than relying on version banners, findings are highly actionable with low false-positive rates. With 27,000+ GitHub stars, Nuclei has become one of the most widely adopted open-source security tools in both bug bounty and enterprise AppSec pipelines.
description Template-Driven Detection
YAML-based templates define exact requests, probes, and matchers per vulnerability — enabling precise, reproducible, near-zero-false-positive scanning.
groups Massive Community Library
12,000+ peer-reviewed templates covering CVEs, KEVs, misconfigurations, default credentials, and exposures maintained by 900+ contributors.
dns Multi-Protocol Coverage
Supports HTTP/S, TCP, DNS, SSL, WebSocket, JavaScript, and WHOIS checks — enabling unified scanning across web, network, and cloud layers.
integration_instructions CI/CD Integration
Native integrations with GitHub Actions, GitLab CI, and Jenkins plus export to Jira, Splunk, and Elastic for embedding into DevSecOps workflows.
Distribution Model
Open Source
Free community edition available.
Enterprise support on request.

Templates
12,000+
Protocols
HTTP, TCP, DNS, SSL
Language
GO
License
MIT