Overview
scan4all integrates Nuclei templates with 3,922 YAML files across 281 directories, providing extensive vulnerability detection capabilities. The embedded templates are automatically available without additional configuration.Template Statistics
By Category (Top 10)
CVE Templates
1,430 templates covering known CVE vulnerabilities
Panel Detection
655 templates for exposed admin panels and interfaces
Exploit-DB
563 templates ported from Exploit-DB
LFI Detection
509 templates for local file inclusion vulnerabilities
By Severity
| Severity | Count | Description |
|---|---|---|
| Info | 1,474 | Informational findings, configuration issues |
| High | 1,009 | High-severity vulnerabilities |
| Medium | 818 | Medium-risk security issues |
| Critical | 478 | Critical vulnerabilities requiring immediate action |
| Low | 225 | Low-severity issues |
| Unknown | 11 | Uncategorized findings |
By Protocol Type
HTTP
3,858 templates for web application testing
File
76 templates for file-based detection
Network
51 templates for network protocol testing
DNS
17 templates for DNS-based detection
Template Organization
Directory Structure (Top 10)
Top Contributors
| Author | Templates | Notable Work |
|---|---|---|
| daffainfo | 631 | CVE research and panel detection |
| dhiyaneshdk | 584 | Comprehensive vulnerability coverage |
| pikpikcu | 329 | Web application security |
| pdteam | 269 | ProjectDiscovery core templates |
| geeknik | 187 | Fuzzing and edge cases |
| dwisiswant0 | 169 | Modern web vulnerabilities |
| 0x_akoko | 165 | Information disclosure |
| princechaddha | 151 | Cloud security |
| ritikchaddha | 137 | API security |
| pussycat0x | 133 | WordPress security |
Popular Template Categories
CVE Templates (1,430)
CVE Templates (1,430)
Nuclei templates covering known Common Vulnerabilities and Exposures:
- CVE-2021 Focus: 352 templates for 2021 vulnerabilities
- Historical CVEs: Coverage from 2010-present
- Critical RCEs: Log4Shell, Spring4Shell, ProxyShell
- Auth Bypass: Authentication mechanism vulnerabilities
- Data Leaks: Information disclosure CVEs
Example: CVE Detection
Exposed Panels (655)
Exposed Panels (655)
Detection of exposed administrative interfaces:
- Admin login pages
- Database management interfaces (phpMyAdmin, Adminer)
- Monitoring dashboards (Grafana, Kibana)
- Container management (Docker, Kubernetes)
- Network devices (routers, switches, firewalls)
- Jenkins
- GitLab
- WordPress admin
- Tomcat Manager
- Weblogic Console
WordPress (419 + 316 plugins)
WordPress (419 + 316 plugins)
Comprehensive WordPress security testing:
- Core vulnerabilities: 419 templates
- Plugin vulnerabilities: 316 templates
- Theme vulnerabilities
- Configuration issues
- Default installations
- Authentication bypass
- SQL injection in plugins
- File upload vulnerabilities
- XSS in themes
- XML-RPC abuse
LFI/Path Traversal (509)
LFI/Path Traversal (509)
Local file inclusion and directory traversal detection:
- Classic LFI patterns
- Path traversal variations
- Filter bypass techniques
- Log poisoning vectors
- Configuration file access
Example: LFI Template
XSS Detection (491)
XSS Detection (491)
Cross-site scripting vulnerability templates:
- Reflected XSS
- Stored XSS
- DOM-based XSS
- Filter bypass techniques
- Framework-specific XSS
Embedded Templates
scan4all embeds Nuclei templates directly in the binary:Configuration
Enable Nuclei Templates
Filter by Severity
Filter by Tags
Template Execution Flow
Customization
Custom Nuclei Config
Createconfig/config.json with Nuclei-specific settings:
Template Configuration Options
| Option | Description | Default |
|---|---|---|
severity | Filter by severity level | all |
tags | Include specific tags | all |
excludeTags | Exclude specific tags | none |
timeout | Template execution timeout (seconds) | 5 |
retries | Number of retries on failure | 1 |
rateLimit | Requests per second | 150 |
bulkSize | Concurrent template execution | 25 |
Output Examples
Critical CVE Detection
Exposed Panel Detection
Performance Optimization
Rate Limiting
Default: 150 requests/second to prevent overwhelming targets
Bulk Execution
Execute 25 templates concurrently for faster scanning
Request Caching
Cache HTTP responses to avoid duplicate requests
Smart Filtering
Only load templates matching detected technologies
Integration with Other POC Systems
scan4all executes POCs in optimal order:- Go POCs - Fastest, executed first for critical vulns
- YAML POCs - xray templates for web apps
- Nuclei Templates - Comprehensive coverage last
This layered approach ensures critical vulnerabilities are detected quickly while maintaining comprehensive coverage.
Best Practices
Severity Filtering
Severity Filtering
Start with critical/high severity templates to identify serious issues quickly:
Tag-Based Scanning
Tag-Based Scanning
Use tags to focus on specific vulnerability types:
Rate Limiting
Rate Limiting
Adjust rate limits based on target capacity:
Result Storage
Result Storage
Store results in Elasticsearch for analysis:
Troubleshooting
Common Issues
| Issue | Solution |
|---|---|
| No results | Verify enableNuclei=true is set |
| Slow execution | Reduce rate limit or bulk size |
| False positives | Use severity filtering |
| Missing templates | Update scan4all to latest version |
Related Resources
Xray POCs
Learn about YAML-based xray POCs
Go POCs
Explore native Go POC modules
Custom POCs
Create your own detection templates
Configuration
Advanced configuration options