sudo. SMB signing checks use NetExec’s --gen-relay-list to identify hosts suitable for NTLM relay attacks.
POST /api/network/nuclei/scan
Launches a Nuclei scan against web services discovered in the most recent Nmap web-port XML file inrecon/. The endpoint reads the XML, extracts all open web ports, builds a target URL list (recon/WebApps.txt), and starts Nuclei in the background.
The scan requires at least one Nmap XML file with "web" in the filename (e.g. nmap_web_20240115.xml) to exist in recon/.
Request Body
Array of Nuclei template tag strings to filter by (e.g.
["cves", "exposures", "default-logins"]). If empty or omitted, all templates are used.Additional raw Nuclei flags appended to the command (e.g.
"-severity critical,high" or "-rl 10").Response
"success" when the scan was launched.UUID for polling with
/api/scan-status/{scan_id}.Number of web application targets extracted from the Nmap XML.
The template tags used, or
"all" if no templates were specified.The Nuclei command that was launched.
POST /api/network/nuclei/scan-direct
Launches a Nuclei scan against an explicit list of target URLs. Bypasses the Nmap XML lookup — useful when you want to scan specific targets that may not be in the database.Request Body
Array of target URL strings (e.g.
["http://10.10.10.1:80", "https://10.10.10.1:8443"]).Nuclei template tag filters. If empty, all templates are run.
Additional raw Nuclei CLI flags.
Response
"success" when the scan was launched.UUID for polling.
Number of targets written to the scan list.
Template tags used, or
"all".The Nuclei command launched.
POST /api/network/nuclei/stop/
Stops a running Nuclei scan by updating its database status tostopped. The underlying process is killed via pkill.
Path Parameter
UUID of the Nuclei scan to stop.
Response
GET /api/network/nuclei/xml-files
Lists all Nmap XML files inrecon/ whose name contains "web". These are the files that the /api/network/nuclei/scan endpoint uses as scan input. The most recently created file is marked with "latest": true.
Response
Array of XML file descriptors, sorted newest first.
POST /api/smb-signing/scan
Runs a NetExec SMB signing check against a target usingnetexec smb <target> --gen-relay-list. Hosts with SMB signing disabled are written to recon/smb_relay.txt and their signing/SMBv1 status is updated in the hosts database. This is a synchronous call — it waits for the scan to complete (up to 5 minutes).
Request Body
IP, CIDR, or range to check (e.g.
"10.10.10.0/24").Response
"success" on completion.Summary including count of vulnerable hosts.
Number of hosts with SMB signing disabled (relay targets).
Total number of hosts observed during the scan.
NetExec command executed.
POST /api/smbsigning/run
Alternate SMB signing endpoint that accepts an array of targets. Functionally equivalent to/api/smb-signing/scan but designed for use when you have a pre-populated list of IPs (e.g. from the Scope table). When more than one target is provided, they are written to a temporary file and passed to NetExec with -iL.
Request Body
Single target IP, CIDR, or comma-separated list.
Array of IP strings. Takes precedence over
target when both are provided.Response
"success" on completion.Summary of results.
UUID of the scan record created.
Raw NetExec output.