ProjectDiscovery
@projectdiscovery.bsky.social
Detect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
Need to integrate a tool into ProjectDiscovery?
Check our technical guides for configuring third-party integrations for cloud assets, vulnerability scanning, alerts, and ticketing.👇
https://docs.projectdiscovery.io/cloud/integrations
#projectdiscovery #hacking
Check our technical guides for configuring third-party integrations for cloud assets, vulnerability scanning, alerts, and ticketing.👇
https://docs.projectdiscovery.io/cloud/integrations
#projectdiscovery #hacking
November 9, 2025 at 2:02 PM
Need to integrate a tool into ProjectDiscovery?
Check our technical guides for configuring third-party integrations for cloud assets, vulnerability scanning, alerts, and ticketing.👇
https://docs.projectdiscovery.io/cloud/integrations
#projectdiscovery #hacking
Check our technical guides for configuring third-party integrations for cloud assets, vulnerability scanning, alerts, and ticketing.👇
https://docs.projectdiscovery.io/cloud/integrations
#projectdiscovery #hacking
Your current vulnerability scanner is basically a very expensive PDF printer.
Learn why current vulnerability scanners fail to stop breaches👇
https://projectdiscovery.io/blog/why-current-vuln-scanners-fail-to-stop-breache
Learn why current vulnerability scanners fail to stop breaches👇
https://projectdiscovery.io/blog/why-current-vuln-scanners-fail-to-stop-breache
November 8, 2025 at 8:02 PM
Your current vulnerability scanner is basically a very expensive PDF printer.
Learn why current vulnerability scanners fail to stop breaches👇
https://projectdiscovery.io/blog/why-current-vuln-scanners-fail-to-stop-breache
Learn why current vulnerability scanners fail to stop breaches👇
https://projectdiscovery.io/blog/why-current-vuln-scanners-fail-to-stop-breache
Want some tips on using Nuclei? Listen to how an elite bug bounty hunter - NahamSec uses it during his testing 👇
#cybersecurity #bugbounty #projectdiscovery #nuclei
#cybersecurity #bugbounty #projectdiscovery #nuclei
November 5, 2025 at 6:02 PM
Want some tips on using Nuclei? Listen to how an elite bug bounty hunter - NahamSec uses it during his testing 👇
#cybersecurity #bugbounty #projectdiscovery #nuclei
#cybersecurity #bugbounty #projectdiscovery #nuclei
New: Credential Monitoring from ProjectDiscovery! Detect leaked credentials tied to your domains or emails from millions of malware-stealer logs.
Learn more & try it free:
projectdiscovery.io/blog/leaked-...
#infosec #cybersecurity #credentialmonitoring
Learn more & try it free:
projectdiscovery.io/blog/leaked-...
#infosec #cybersecurity #credentialmonitoring
November 4, 2025 at 12:03 PM
New: Credential Monitoring from ProjectDiscovery! Detect leaked credentials tied to your domains or emails from millions of malware-stealer logs.
Learn more & try it free:
projectdiscovery.io/blog/leaked-...
#infosec #cybersecurity #credentialmonitoring
Learn more & try it free:
projectdiscovery.io/blog/leaked-...
#infosec #cybersecurity #credentialmonitoring
Nuclei 🤝 Linear
Watch the video below to learn about the Linear integration inside Nuclei, which simplifies vulnerability tracking 👇
#cybersecurity #hacking #nuclei #linear #vulnerabilitytracking
Watch the video below to learn about the Linear integration inside Nuclei, which simplifies vulnerability tracking 👇
#cybersecurity #hacking #nuclei #linear #vulnerabilitytracking
November 4, 2025 at 10:03 AM
Nuclei 🤝 Linear
Watch the video below to learn about the Linear integration inside Nuclei, which simplifies vulnerability tracking 👇
#cybersecurity #hacking #nuclei #linear #vulnerabilitytracking
Watch the video below to learn about the Linear integration inside Nuclei, which simplifies vulnerability tracking 👇
#cybersecurity #hacking #nuclei #linear #vulnerabilitytracking
Watch NahamSec explain why subfinder is still his favorite tool for subdomain discovery 👇
#cybersecurity #hacking #subfinder #subdomaindiscovery
#cybersecurity #hacking #subfinder #subdomaindiscovery
November 3, 2025 at 8:02 PM
Watch NahamSec explain why subfinder is still his favorite tool for subdomain discovery 👇
#cybersecurity #hacking #subfinder #subdomaindiscovery
#cybersecurity #hacking #subfinder #subdomaindiscovery
Creating templates could not be easier - make ready-to-go templates on our cloud platform just by providing a URL
Watch the video below and sign up here 👇
https://cloud.projectdiscovery.io/sign-up
#cybersecurity #hacking #projectdiscovery #ai
Watch the video below and sign up here 👇
https://cloud.projectdiscovery.io/sign-up
#cybersecurity #hacking #projectdiscovery #ai
November 2, 2025 at 6:03 PM
Creating templates could not be easier - make ready-to-go templates on our cloud platform just by providing a URL
Watch the video below and sign up here 👇
https://cloud.projectdiscovery.io/sign-up
#cybersecurity #hacking #projectdiscovery #ai
Watch the video below and sign up here 👇
https://cloud.projectdiscovery.io/sign-up
#cybersecurity #hacking #projectdiscovery #ai
Want a quick way to install and keep Project Discovery tools up to date? Use pdtm 👇
#cybersecurity #hacking #projectdiscovery #bugbounty
#cybersecurity #hacking #projectdiscovery #bugbounty
November 1, 2025 at 11:02 AM
Want a quick way to install and keep Project Discovery tools up to date? Use pdtm 👇
#cybersecurity #hacking #projectdiscovery #bugbounty
#cybersecurity #hacking #projectdiscovery #bugbounty
We shipped Nuclei Templates v10.3.0 & v10.3.1 during #Hacktoberfest: 243 new templates and 178 CVEs including 44 KEVs (CISA). Community FTW! 💪
Recap + how to scan: projectdiscovery.io/blog/hacktob...
#Nuclei #AppSec #KEV #CVE
Recap + how to scan: projectdiscovery.io/blog/hacktob...
#Nuclei #AppSec #KEV #CVE
Hacktober 2025 - Nuclei Templates — ProjectDiscovery Blog
Summary of Releases v10.3.0 & v10.3.1
This month, we had two major releases of Nuclei Templates, introducing numerous improvements and new templates for Nuclei users.
🚀 Hacktober Stats
Release
...
projectdiscovery.io
October 31, 2025 at 7:20 PM
We shipped Nuclei Templates v10.3.0 & v10.3.1 during #Hacktoberfest: 243 new templates and 178 CVEs including 44 KEVs (CISA). Community FTW! 💪
Recap + how to scan: projectdiscovery.io/blog/hacktob...
#Nuclei #AppSec #KEV #CVE
Recap + how to scan: projectdiscovery.io/blog/hacktob...
#Nuclei #AppSec #KEV #CVE
Our Apriso RCE path (unauth SOAP → auth upload → web-shell) is now in CISA's KEV. If you run DELMIA Apriso 2020–2025, patch now & hunt for new privileged users / rogue files. Details + templates: projectdiscovery.io/blog/remote-...
#KEV #AppSec #OTsecurity
#KEV #AppSec #OTsecurity
Remote Code Execution in DELMIA Apriso — ProjectDiscovery Blog
Introduction
DELMIA Apriso is a manufacturing execution and operations orchestration platform used by large manufacturers, service providers, and critical infrastructure operators. Because the produc...
projectdiscovery.io
October 30, 2025 at 12:45 PM
Our Apriso RCE path (unauth SOAP → auth upload → web-shell) is now in CISA's KEV. If you run DELMIA Apriso 2020–2025, patch now & hunt for new privileged users / rogue files. Details + templates: projectdiscovery.io/blog/remote-...
#KEV #AppSec #OTsecurity
#KEV #AppSec #OTsecurity
From “maybe vulnerable” to “provably exploitable.” We break down how templates are proposed, reproduced in our labs, checklist-hardened, double-reviewed, and improved in the open: projectdiscovery.io/blog/open-by...
October 23, 2025 at 7:11 PM
From “maybe vulnerable” to “provably exploitable.” We break down how templates are proposed, reproduced in our labs, checklist-hardened, double-reviewed, and improved in the open: projectdiscovery.io/blog/open-by...
Most vuln scanning tools still grade you on "is it the latest version?", which is how you end up with PDFs full of "critical" maybes and a frustrated engineering team. We take a different path: validate exploitability at runtime and get to yes/no instead of maybe. projectdiscovery.io/blog/from-de...
October 9, 2025 at 2:00 PM
Most vuln scanning tools still grade you on "is it the latest version?", which is how you end up with PDFs full of "critical" maybes and a frustrated engineering team. We take a different path: validate exploitability at runtime and get to yes/no instead of maybe. projectdiscovery.io/blog/from-de...
We dug into DELMIA Apriso & found more than we expected.
A deserialization flaw (CVE-2025-5086) let us turn a SOAP request into full RCE.
Read the research 👉 projectdiscovery.io/blog/remote-...
Patch ASAP; we’ve included a Nuclei template for easy scanning.
#BugBounty #RCE #manufacturing
A deserialization flaw (CVE-2025-5086) let us turn a SOAP request into full RCE.
Read the research 👉 projectdiscovery.io/blog/remote-...
Patch ASAP; we’ve included a Nuclei template for easy scanning.
#BugBounty #RCE #manufacturing
Remote Code Execution in DELMIA Apriso — ProjectDiscovery Blog
Introduction
DELMIA Apriso is a manufacturing execution and operations orchestration platform used by large manufacturers, service providers, and critical infrastructure operators. Because the produc...
projectdiscovery.io
September 24, 2025 at 1:01 PM
We dug into DELMIA Apriso & found more than we expected.
A deserialization flaw (CVE-2025-5086) let us turn a SOAP request into full RCE.
Read the research 👉 projectdiscovery.io/blog/remote-...
Patch ASAP; we’ve included a Nuclei template for easy scanning.
#BugBounty #RCE #manufacturing
A deserialization flaw (CVE-2025-5086) let us turn a SOAP request into full RCE.
Read the research 👉 projectdiscovery.io/blog/remote-...
Patch ASAP; we’ve included a Nuclei template for easy scanning.
#BugBounty #RCE #manufacturing
Stop running Subfinder, Nuclei, HTTPX “out of the box”
In this walkthrough we:
• Build a VPS recon box
• Install & manage all PD tools w/ Go installer
• Chain Subfinder → AlterX → DNSX → Naboo → HTTPX → Katana
• Move from automation → methodology
Watch: www.youtube.com/watch?v=evyx...
In this walkthrough we:
• Build a VPS recon box
• Install & manage all PD tools w/ Go installer
• Chain Subfinder → AlterX → DNSX → Naboo → HTTPX → Katana
• Move from automation → methodology
Watch: www.youtube.com/watch?v=evyx...
Free Recon Course and Methodology For Bug Bounty Hunters
YouTube video by NahamSec
www.youtube.com
September 23, 2025 at 7:17 PM
Stop running Subfinder, Nuclei, HTTPX “out of the box”
In this walkthrough we:
• Build a VPS recon box
• Install & manage all PD tools w/ Go installer
• Chain Subfinder → AlterX → DNSX → Naboo → HTTPX → Katana
• Move from automation → methodology
Watch: www.youtube.com/watch?v=evyx...
In this walkthrough we:
• Build a VPS recon box
• Install & manage all PD tools w/ Go installer
• Chain Subfinder → AlterX → DNSX → Naboo → HTTPX → Katana
• Move from automation → methodology
Watch: www.youtube.com/watch?v=evyx...
Only ~6% of CVEs are ever exploited… yet scanners still flood teams with endless alerts.
More signatures ≠ more security. They guess. We validate.
Curious what actually matters? Check out our latest blog: The Coverage Lie 👉 projectdiscovery.io/blog/why-cur...
More signatures ≠ more security. They guess. We validate.
Curious what actually matters? Check out our latest blog: The Coverage Lie 👉 projectdiscovery.io/blog/why-cur...
September 3, 2025 at 8:43 PM
Only ~6% of CVEs are ever exploited… yet scanners still flood teams with endless alerts.
More signatures ≠ more security. They guess. We validate.
Curious what actually matters? Check out our latest blog: The Coverage Lie 👉 projectdiscovery.io/blog/why-cur...
More signatures ≠ more security. They guess. We validate.
Curious what actually matters? Check out our latest blog: The Coverage Lie 👉 projectdiscovery.io/blog/why-cur...