Replies: 2 comments 2 replies
-
In the json result of afrog , each vulnerability json carries a field as target. Does nuclei also have this function? |
Beta Was this translation helpful? Give feedback.
0 replies
-
What kind of output do you expect? Could you give an example? You can find the host you're scanning in the output jsonl: $ nuclei -u honey.scanme.sh -j | jq -r .host
__ _
____ __ _______/ /__ (_)
/ __ \/ / / / ___/ / _ \/ /
/ / / / /_/ / /__/ / __/ /
/_/ /_/\__,_/\___/_/\___/_/ v3.3.9
projectdiscovery.io
[WRN] Found 2 templates with runtime error (use -validate flag for further examination)
[INF] Current nuclei version: v3.3.9 (latest)
[INF] Current nuclei-templates version: v10.1.2 (latest)
[WRN] Scan results upload to cloud is disabled.
[INF] New templates added in latest release: 52
[INF] Templates loaded for current scan: 7677
[INF] Executing 7282 signed templates from projectdiscovery/nuclei-templates
[WRN] Loading 395 unsigned templates for scan. Use with caution.
[INF] Targets loaded for current scan: 1
[INF] Running httpx on input host
[INF] Found 1 URL from httpx
[INF] Templates clustered: 1714 (Reduced 1613 Requests)
honey.scanme.sh
... |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
How to get from a scanned vulnerability JSON file, target to match it one-to-one with multiple targets entered
cmd:
Beta Was this translation helpful? Give feedback.
All reactions