phase 2 : vuln scanning | nuclei + custom templates
save as exposed-git.yaml and run
cat live_hosts.txt | nuclei -t exposed-git.yaml -o git_exposure.txt
Avoid "N/A" or "Duplicate" responses
Bash Script for SQLi Testing
#!/bin/bash
# Save as sqli_scanner.sh
INPUT_FILE="urls_with_params.txt"
while read url; do
sqlmap -u "$url" --batch --random-agent --level 3 --risk 2 --dbs --output-dir=./sqlmap_results
done < "$INPUT_FILE"
Extract URLs with Parameters:
cat urls.txt | grep -E "\\.php\\?id=|\\.asp\\?q=" | qsreplace "FUZZ" | anew urls_with_params.txt
Automate Burp Suite for auth/logic flaws.
1. Record a Macro: