Nuclei runs as your regular user — no sudo required.
Navigate to the scanner
Open NETWORK → Nuclei in the sidebar.How target selection works
The standard scan endpoint (POST /api/network/nuclei/scan) builds its target list from the most recent nmap XML file in recon/ whose filename contains web. It extracts all hosts with open ports that match known web port numbers:
recon/WebApps.txt and passed to nuclei via -l.
If you want to supply targets directly without relying on a saved nmap scan, use the direct endpoint instead:
Tag filtering
Nuclei templates are organized by tags. Pass a list of tags to limit the scan to relevant template categories:templates array values are joined with commas and passed as -tags <value>. Leave the array empty to run all templates.
Custom flags
Thecustom_cmd field appends arbitrary nuclei flags after the tag filter. Use this to restrict severity, set rate limits, or pass any other nuclei CLI options:
Running a scan
Ensure a web nmap scan exists
Run an nmap scan with the Web port preset first. Nuclei’s standard endpoint looks for
*web*.xml in recon/ to build the target list.Select tags (optional)
Choose one or more template tag categories from the UI, or leave blank to run the full template library.
Output file
-j flag). Each line is a separate finding with template ID, severity, matched host, and extracted data.
Stopping a scan
To stop a running nuclei scan:stopped in the database. The underlying process has a 1-hour hard timeout enforced server-side.
Listing available nmap XML files
To see which nmap web XML files are available for the standard scan endpoint to use:"latest": true is the one the scan endpoint will use.