Official template repository
The official Nuclei templates are hosted on GitHub and maintained by ProjectDiscovery and the community.nuclei-templates
Official templates repository with 9,000+ templates
Cloud template editor
Free AI-powered template editor to create and test templates
Template categories
Templates are organized into the following main categories:CVEs
CVEs
Templates for detecting known Common Vulnerabilities and Exposures (CVEs). These templates are updated regularly as new CVEs are disclosed.Examples:
- CVE-2021-44228 (Log4Shell)
- CVE-2024-22120 (Blind SQL Injection)
- CVE-2023-4173 (Reflected XSS)
Exposures
Exposures
Templates for detecting sensitive file disclosures, data leaks, and exposed endpoints.Examples:
.git/configexposurebower.jsonfile disclosure- Configuration file leaks
- Backup file exposure
Misconfigurations
Misconfigurations
Templates for identifying security misconfigurations in web applications, servers, and cloud services.Examples:
- Unprotected Jenkins console
- Open S3 buckets
- Default credentials
- Misconfigured CORS policies
Technologies
Technologies
Templates organized by technology stack (WordPress, Joomla, Jenkins, etc.).
Vulnerabilities
Vulnerabilities
General vulnerability templates including SQL injection, XSS, RCE, and more.
Using templates
Install and update templates
Nuclei automatically downloads templates on first run. To update to the latest templates:Run specific template categories
Filter by severity
Filter by tags
Template structure
All Nuclei templates follow a standard YAML structure:Contributing templates
See the Contributing guide for details on how to contribute templates to the official library.
Template validation
Before submitting templates, validate them using the built-in validator:Community resources
Template editor
AI-powered online editor for creating templates
Discord community
Join the community for help and discussions
Template syntax
Learn the template syntax and structure
Submit bounty templates
Earn rewards for high-quality templates