Vulnerability Module
⚠️ Important Warning
Module Overview
Function
Vulnerability Type
Tools
Configuration Options
Nuclei Scanning
nuclei_check - Full Vulnerability Scanning
nuclei_check - Full Vulnerability ScanningInjection Vulnerabilities
xss - Cross-Site Scripting
xss - Cross-Site Scriptingsqli - SQL Injection
sqli - SQL Injectionssti - Server-Side Template Injection
ssti - Server-Side Template Injectionlfi - Local File Inclusion
lfi - Local File Inclusioncommand_injection - Command Injection
command_injection - Command InjectionServer-Side Vulnerabilities
ssrf_checks - Server-Side Request Forgery
ssrf_checks - Server-Side Request Forgerycors - CORS Misconfiguration
cors - CORS Misconfigurationcrlf_checks - CRLF Injection
crlf_checks - CRLF InjectionAdvanced Vulnerabilities
prototype_pollution - Prototype Pollution
prototype_pollution - Prototype Pollutionsmuggling - HTTP Request Smuggling
smuggling - HTTP Request Smugglingwebcache - Web Cache Poisoning
webcache - Web Cache PoisoningBypass Techniques
open_redirect - Open Redirect
open_redirect - Open Redirect4xxbypass - 403/401 Bypass
4xxbypass - 403/401 BypassSSL/TLS Analysis
test_ssl - SSL/TLS Security
test_ssl - SSL/TLS SecurityCredential Testing
spraying - Password Spraying
spraying - Password SprayingParameter Fuzzing
fuzzparams - Parameter Value Fuzzing
fuzzparams - Parameter Value FuzzingBroken Links
brokenLinks - Broken Link Hijacking
brokenLinks - Broken Link HijackingEnabling Vulnerability Scanning
Method 1: Use -a Flag
-a FlagMethod 2: Enable in Config
Method 3: Selective Enabling
Output Summary
File
Content
Best Practices
Next Steps
Last updated