0xKayala / NucleiFuzzer

NucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications
https://github.com/0xKayala/NucleiFuzzer
1.31k stars 201 forks source link

Enhancements to the NucleiFuzzer Script #8

Closed YoruYagami closed 1 year ago

YoruYagami commented 1 year ago

Description:

This pull request introduces several key enhancements to the NucleiFuzzer script, aiming to provide users with more flexibility, better organization, and improved error handling.

Features Added:

  1. Multiple Domain Scanning: Users can now scan multiple domains by reading them from a file. This is especially useful for batch scanning.

    • Usage: -l, --list <file_with_domains>
  2. Custom Template Path for Nuclei: A new option has been added to allow users to specify a custom template path for Nuclei, providing more flexibility in vulnerability scanning.

    • Usage: -t, --template <path_to_custom_templates>
  3. Timestamped Directories: To better organize scan results, each scan session's results are now stored in a timestamp-based directory. This ensures that results from different sessions don't overlap and are easy to locate.

  4. Enhanced Directory Structure: Within the timestamped directory, separate sub-directories have been created for ParamSpider and Nuclei results. This provides a clear distinction and organization of the output.

  5. Automated Cleanup: Post-execution, the script now checks for empty output files and deletes them. This ensures that users don't have to manually clean up redundant files.

  6. Enhanced Error Handling: The script now checks the validity of provided domains or domain list files, ensuring that the scanning process is smooth and error-free.

Testing:

The enhanced script has been tested on multiple domains, both individually and in batches. All new features have been verified to work as expected.