Nuclei-AI-Prompts

Nuclei-AI-Prompts

203 Stars

Nuclei-AI-Prompts

reewardius
Jun 24, 2025
203 stars
Category
Bug-bounty
GitHub Stars
203
Project Added On
Jun 24, 2025
Contributors
1

Nuclei-AI-Prompts

1️⃣ Recon

docker run -v $(pwd):/src projectdiscovery/subfinder:latest -dL /src/domains -silent -o /src/subdomains && \
docker run -v $(pwd):/src projectdiscovery/dnsx:latest -l /src/subdomains -t 500 -retry 5 -silent -o /src/dnsx && \
docker run -v $(pwd):/src projectdiscovery/naabu:latest -l /src/dnsx -tp 1000 -s s -ec -c 100 -rate 5000 -o /src/alive_ports && \
docker run -v $(pwd):/src projectdiscovery/httpx:latest -l /src/alive_ports -t 100 -rl 500 -o /src/targets.txt

2️⃣ Recon (Active Crawl Links)

katana -l targets.txt -aff -jc -iqp -hl -nos -c 50 -p 50 -j -o katana.jsonl

3️⃣ Recon (Active + Passive JS Links)

docker run -v $(pwd):/src secsi/getjs --input /src/targets.txt --complete --output /src/js_links && \
katana -u targets.txt -ps -em js,json >> js_links # katana version 1.1.0 -> go install -v github.com/projectdiscovery/katana/cmd/[email protected]

Fast Info Gathering

nuclei -list targets.txt -ai "Extract page title, detech tech and versions"
nuclei -list targets.txt -ai "Extract email addresses from web pages"
nuclei -list targets.txt -ai "Extract all subdomains referenced in web pages"
nuclei -list targets.txt -ai "Extract all external resource URLs (CDNs, images, iframes, fonts) from HTML"
nuclei -list targets.txt -ai "Extract social media profile links from web pages"
nuclei -list targets.txt -ai "Extract links pointing to staging, dev, or beta environments from HTML"
nuclei -list targets.txt -ai "Extract all links pointing to PDF, DOCX, XLSX, and other downloadable documents"

Low Hanging Fruits

nuclei -list targets.txt -ai "Find exposed AI/ML model files (.pkl, .h5, .pt) that may leak proprietary algorithms or sensitive training data"
nuclei -list targets.txt -ai "Find exposed automation scripts (.sh, .ps1, .bat) revealing internal tooling or credentials"
nuclei -list targets.txt -ai "Identify misconfigured CSP headers allowing 'unsafe-inline' or wildcard sources"
nuclei -list targets.txt -ai "Detect pages leaking JWT tokens in URLs or cookies"
nuclei -list targets.txt -ai "Identify overly verbose error messages revealing framework or library details"
nuclei -list targets.txt -ai "Find application endpoints with verbose stack traces or source code exposure"
nuclei -list targets.txt -ai "Find sensitive information in HTML comments (debug notes, API keys, credentials)"
nuclei -list targets.txt -ai "Find exposed .env files leaking credentials, API keys, and database passwords"
nuclei -list targets.txt -ai "Find exposed configuration files such as config.json, config.yaml, config.php, application.properties containing API keys and database credentials."
nuclei -list targets.txt -ai "Find exposed configuration files containing sensitive information such as credentials, API keys, database passwords, and cloud service secrets."  
nuclei -list targets.txt -ai "Find database configuration files such as database.yml, db_config.php, .pgpass, .my.cnf leaking credentials."  
nuclei -list targets.txt -ai "Find exposed Docker and Kubernetes configuration files such as docker-compose.yml, kubeconfig, .dockercfg, .docker/config.json containing cloud credentials and secrets."  
nuclei -list targets.txt -ai "Find exposed SSH keys and configuration files such as id_rsa, authorized_keys, and ssh_config."  
nuclei -list targets.txt -ai "Find exposed WordPress configuration files (wp-config.php) containing database credentials and authentication secrets."  
nuclei -list targets.txt -ai "Identify exposed .npmrc and .yarnrc files leaking NPM authentication tokens"
nuclei -list targets.txt -ai "Identify open directory listings exposing sensitive files"  
nuclei -list targets.txt -ai "Find exposed .git directories allowing full repo download"
nuclei -list targets.txt -ai "Find exposed .svn and .hg repositories leaking source code"  
nuclei -list targets.txt -ai "Identify open FTP servers allowing anonymous access"  
nuclei -list targets.txt -ai "Find GraphQL endpoints with introspection enabled"  
nuclei -list targets.txt -ai "Identify exposed .well-known directories revealing sensitive data"  
nuclei -list targets.txt -ai "Find publicly accessible phpinfo() pages leaking environment details"  
nuclei -list targets.txt -ai "Find exposed Swagger, Redocly, GraphiQL, and API Blueprint documentation"  
nuclei -list targets.txt -ai "Identify exposed .vscode and .idea directories leaking developer configs"  
nuclei -list targets.txt -ai "Detect internal IP addresses (10.x.x.x, 192.168.x.x, etc.) in HTTP responses"  
nuclei -list targets.txt -ai "Find exposed WordPress debug.log files leaking credentials and error messages"  
nuclei -list targets.txt -ai "Detect misconfigured CORS allowing wildcard origins ('*')"  
nuclei -list targets.txt -ai "Find publicly accessible backup and log files (.log, .bak, .sql, .zip, .dump)"  
nuclei -list targets.txt -ai "Find exposed admin panels with default credentials"
nuclei -list targets.txt -ai "Identify commonly used API endpoints that expose sensitive user data, returning HTTP status 200 OK."
nuclei -list targets.txt -ai "Detect web applications running in debug mode, potentially exposing sensitive system information."  

Advanced Mixed Testing

nuclei -list targets.txt -ai "Detect debug endpoints revealing system information"  
nuclei -list targets.txt -ai "Identify test and staging environments exposed to the internet"  
nuclei -list targets.txt -ai "Find admin login endpoints, filter 404 response code"
nuclei -list targets.txt -ai "Find misconfigured CORS policies allowing wildcard origins"
nuclei -list targets.txt -ai "Detect exposed stack traces in error messages"
nuclei -list targets.txt -ai "Find misconfigured Apache and Nginx security headers"  
nuclei -list targets.txt -ai "Check for APIs allowing unauthenticated access to admin routes"  
nuclei -list targets.txt -ai "Identify exposed admin panels of popular CMS (WordPress, Joomla, Magent, Opencart, etc.)"
nuclei -list targets.txt -ai "Find forgotten admin panels under uncommon paths (/secret-admin/, /super-admin/, /superuser/)"
nuclei -list targets.txt -ai "Find login pages using default HTTP basic auth with common credentials"
nuclei -list targets.txt -ai "Identify misconfigured iframe policies allowing clickjacking"

Sensitive Data Exposure

nuclei -list targets.txt -ai "Scan for exposed environment files (.env) containing credentials"
nuclei -list targets.txt -ai "Find open directory listings and publicly accessible files"
nuclei -list targets.txt -ai "Detect exposed .git repositories and sensitive files"
nuclei -list targets.txt -ai "Identify publicly accessible backup and log files (.log, .bak, .sql, .dump)"
nuclei -list targets.txt -ai "Detect exposed .htaccess and .htpasswd files"
nuclei -list targets.txt -ai "Check for SSH private keys leaked in web directories"
nuclei -list targets.txt -ai "Find exposed API keys and secrets in responses and URLs"
nuclei -list targets.txt -ai "Identify API endpoints leaking sensitive data"
nuclei -list targets.txt -ai "Scan for hardcoded credentials in source code comments"
nuclei -list targets.txt -ai "Identify sensitive endpoints leaking personal or internal data"
nuclei -list targets.txt -ai "Detect vulnerable API endpoints exposing user input or sensitive information"
nuclei -list targets.txt -ai "Find exposed server status pages (e.g., phpinfo, server-status)"
nuclei -list targets.txt -ai "Identify sensitive configuration files (.env, .config, application.properties, settings.py)"
nuclei -list targets.txt -ai "Scan for information leaks in HTTP responses and headers"

Sensitive Data Exposure (Javascript Files)

```
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find leaked database credentials in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Perform a full deep JavaScript security audit: API keys, secrets, internal endpoints, debug logs, authentication tokens, and misconfigurations”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find hardcoded API keys, JWT tokens, OAuth credentials, and authentication secrets in JavaScript”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Identify hardcoded cloud service credentials (AWS, GCP, Azure) in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find internal API endpoints (REST, GraphQL, WebSockets) hidden in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Detect API keys, JWT tokens, and passwords in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find AWS, Google Cloud, and Azure API keys exposed in JavaScript”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Detect OAuth, Facebook, Twitter, and Google API tokens in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find Firebase, MongoDB, and Elasticsearch credentials in JavaScript”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Detect hardcoded JWT tokens and secrets in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Identify exposed payment API keys for Stripe, PayPal, and Square in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Find debugging logs, internal API endpoints, and test credentials in JavaScript”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Analyze JavaScript code for security vulnerabilities (XSS, CSRF, SSRF, RCE, LFI, LFR, etc)”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/js_links -ai “Detect corporate email addresses, internal contacts and internal resource in JavaScript files”
docker run -v $(pwd):/src projectdiscovery/nuclei:latest -l /src/

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

reewardius

Project Added On

June 24, 2025

License

Open Source

Tags

security tool