-|
+ |
+
+### 🚨 Known Exploited Vulnerabilities (KEV) Coverage
+
+Nuclei templates provide coverage for vulnerabilities actively exploited in the wild:
+
+| **KEV Source** | **Templates** | **Description** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - Enhanced vulnerability intelligence |
+| 🟢 **Both Sources** | **{kev_stats.get('both', 0)}** | Templates covering vulnerabilities in both catalogs |
+
+> 💡 **Total unique KEV templates: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - Use `nuclei -tags kev,vkev` to scan for actively exploited vulnerabilities
+
+---
{get_top10()}
diff --git a/.github/scripts/README_CN.tmpl b/.github/scripts/README_CN.tmpl
index 208745e5b6e..83797062758 100644
--- a/.github/scripts/README_CN.tmpl
+++ b/.github/scripts/README_CN.tmpl
@@ -42,7 +42,21 @@ Nuclei 模板
-|
+ |
+
+### 🚨 已知被利用漏洞 (KEV) 覆盖范围
+
+Nuclei 模板为野外被积极利用的漏洞提供覆盖:
+
+| **KEV 来源** | **模板数量** | **描述** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 已知被利用漏洞目录](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 增强的漏洞情报 |
+| 🟢 **两个来源** | **{kev_stats.get('both', 0)}** | 覆盖两个目录中漏洞的模板 |
+
+> 💡 **唯一 KEV 模板总数: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - 使用 `nuclei -tags kev,vkev` 扫描被积极利用的漏洞
+
+---
{get_top10()}
diff --git a/.github/scripts/README_JA.tmpl b/.github/scripts/README_JA.tmpl
index c9aca34dbdd..c8df3db2400 100644
--- a/.github/scripts/README_JA.tmpl
+++ b/.github/scripts/README_JA.tmpl
@@ -37,7 +37,21 @@ Nucleiテンプレートプロジェクトの概要であり、ユニークな
-|
+ |
+
+### 🚨 既知の悪用される脆弱性 (KEV) カバレッジ
+
+Nucleiテンプレートは、野生で積極的に悪用されている脆弱性のカバレッジを提供します:
+
+| **KEV ソース** | **テンプレート数** | **説明** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 既知の悪用される脆弱性カタログ](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 強化された脆弱性インテリジェンス |
+| 🟢 **両方のソース** | **{kev_stats.get('both', 0)}** | 両方のカタログの脆弱性をカバーするテンプレート |
+
+> 💡 **ユニークKEVテンプレート総数: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - `nuclei -tags kev,vkev` を使用して積極的に悪用されている脆弱性をスキャン
+
+---
{get_top10()}
diff --git a/.github/scripts/README_KR.tmpl b/.github/scripts/README_KR.tmpl
index c22e509d96d..037dbfe2bfd 100644
--- a/.github/scripts/README_KR.tmpl
+++ b/.github/scripts/README_KR.tmpl
@@ -39,7 +39,21 @@ Nuclei 템플릿
-|
+ |
+
+### 🚨 알려진 악용되는 취약점 (KEV) 적용 범위
+
+Nuclei 템플릿은 실제로 악용되고 있는 취약점에 대한 적용 범위를 제공합니다:
+
+| **KEV 소스** | **템플릿 수** | **설명** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 알려진 악용되는 취약점 카탈로그](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 강화된 취약점 인텔리전스 |
+| 🟢 **두 소스 모두** | **{kev_stats.get('both', 0)}** | 두 카탈로그의 취약점을 포함하는 템플릿 |
+
+> 💡 **총 고유 KEV 템플릿: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - `nuclei -tags kev,vkev`를 사용하여 적극적으로 악용되는 취약점 스캔
+
+---
{get_top10()}
diff --git a/.github/scripts/count-kev-stats.py b/.github/scripts/count-kev-stats.py
new file mode 100755
index 00000000000..4aff9287711
--- /dev/null
+++ b/.github/scripts/count-kev-stats.py
@@ -0,0 +1,119 @@
+#!/usr/bin/env python3
+"""
+Count KEV and vKEV templates for README statistics
+
+This script counts the number of templates with 'kev' and 'vkev' tags
+and outputs the statistics in a format suitable for the README.
+"""
+
+import re
+import sys
+from pathlib import Path
+from typing import Dict, Set
+
+
+def has_tag_in_file(file_path: Path, tag: str) -> bool:
+ """Check if a template file has a specific tag."""
+ try:
+ with open(file_path, 'r', encoding='utf-8') as f:
+ content = f.read()
+
+ # Look for tags field and check if tag is present
+ tags_match = re.search(r'tags:\s*([^\n]+)', content)
+ if tags_match:
+ tags_str = tags_match.group(1)
+ # Check for tag as a standalone tag (not part of another word)
+ if re.search(rf'\b{tag}\b', tags_str, re.IGNORECASE):
+ return True
+ except Exception as e:
+ print(f"Error reading {file_path}: {e}", file=sys.stderr)
+
+ return False
+
+
+def count_kev_templates(root_dir: str) -> Dict[str, int]:
+ """Count templates with KEV and vKEV tags."""
+ root_path = Path(root_dir)
+
+ # Find all YAML template files
+ patterns = [
+ "**/*.yaml",
+ "**/*.yml"
+ ]
+
+ all_files = set()
+ for pattern in patterns:
+ all_files.update(root_path.glob(pattern))
+
+ # Filter out non-template files
+ template_files = [
+ f for f in all_files
+ if '/workflows/' not in str(f)
+ and '/.github/' not in str(f)
+ and '/profiles/' not in str(f)
+ ]
+
+ kev_count = 0
+ vkev_count = 0
+ both_count = 0
+ kev_only_count = 0
+ vkev_only_count = 0
+
+ kev_files = set()
+ vkev_files = set()
+
+ for template_file in template_files:
+ has_kev = has_tag_in_file(template_file, 'kev')
+ has_vkev = has_tag_in_file(template_file, 'vkev')
+
+ if has_kev:
+ kev_count += 1
+ kev_files.add(template_file)
+
+ if has_vkev:
+ vkev_count += 1
+ vkev_files.add(template_file)
+
+ if has_kev and has_vkev:
+ both_count += 1
+ elif has_kev:
+ kev_only_count += 1
+ elif has_vkev:
+ vkev_only_count += 1
+
+ return {
+ 'kev_total': kev_count,
+ 'vkev_total': vkev_count,
+ 'both': both_count,
+ 'kev_only': kev_only_count,
+ 'vkev_only': vkev_only_count,
+ 'total_templates': len(template_files)
+ }
+
+
+def main():
+ """Main entry point."""
+ root_dir = sys.argv[1] if len(sys.argv) > 1 else '.'
+
+ stats = count_kev_templates(root_dir)
+
+ # Output in a format that can be easily parsed
+ print(f"KEV_TOTAL={stats['kev_total']}")
+ print(f"VKEV_TOTAL={stats['vkev_total']}")
+ print(f"BOTH={stats['both']}")
+ print(f"KEV_ONLY={stats['kev_only']}")
+ print(f"VKEV_ONLY={stats['vkev_only']}")
+ print(f"TOTAL_TEMPLATES={stats['total_templates']}")
+
+ # Also print human-readable summary to stderr for logging
+ print("\n=== KEV/vKEV Statistics ===", file=sys.stderr)
+ print(f"CISA KEV templates: {stats['kev_total']}", file=sys.stderr)
+ print(f"VulnCheck KEV templates: {stats['vkev_total']}", file=sys.stderr)
+ print(f"Templates in both: {stats['both']}", file=sys.stderr)
+ print(f"CISA KEV only: {stats['kev_only']}", file=sys.stderr)
+ print(f"VulnCheck KEV only: {stats['vkev_only']}", file=sys.stderr)
+ print(f"Total templates scanned: {stats['total_templates']}", file=sys.stderr)
+
+
+if __name__ == "__main__":
+ main()
diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py
index d7725d52581..3efcab3c5b0 100644
--- a/.github/scripts/update-readme.py
+++ b/.github/scripts/update-readme.py
@@ -1,6 +1,7 @@
#!/usr/bin/env python3
import glob
import subprocess
+import re
def countTpl(path):
return len(glob.glob(path + "/*.*"))
@@ -13,8 +14,38 @@ def get_top10():
TOP10 = command(["cat", "TOP-10.md"])
return HEADER + TOP10 if len(TOP10) > 0 else ""
+def get_kev_stats():
+ """Get KEV and vKEV statistics by running the count-kev-stats.py script."""
+ try:
+ result = subprocess.run(
+ ["python3", ".github/scripts/count-kev-stats.py"],
+ text=True,
+ capture_output=True,
+ timeout=120
+ )
+
+ # Parse the output
+ stats = {}
+ for line in result.stdout.strip().split('\n'):
+ if '=' in line:
+ key, value = line.split('=')
+ stats[key.lower()] = int(value)
+
+ return stats
+ except Exception as e:
+ print(f"Error getting KEV stats: {e}")
+ return {
+ 'kev_total': 0,
+ 'vkev_total': 0,
+ 'both': 0,
+ 'kev_only': 0,
+ 'vkev_only': 0,
+ 'total_templates': 0
+ }
+
if __name__ == "__main__":
version = command(["git", "describe", "--tags", "--abbrev=0"])
+ kev_stats = get_kev_stats()
template = eval(open(".github/scripts/README.tmpl", "r").read())
print(template)
diff --git a/.github/workflows/readme-update.yml b/.github/workflows/readme-update.yml
index a206c1a895b..7a7d37d906c 100644
--- a/.github/workflows/readme-update.yml
+++ b/.github/workflows/readme-update.yml
@@ -2,7 +2,7 @@ name: 📝 Readme Update
on:
workflow_run:
- workflows: ["🗒 Templates Stats"]
+ workflows: ["🗒 Templates Stats", "📋 KEV & vKEV Tag Update"]
types:
- completed
workflow_dispatch:
diff --git a/README.md b/README.md
index b4dd516bc48..d10ffaa92fe 100644
--- a/README.md
+++ b/README.md
@@ -36,24 +36,38 @@ An overview of the nuclei template project, including statistics on unique tags,
-|
+ |
+
+### 🚨 Known Exploited Vulnerabilities (KEV) Coverage
+
+Nuclei templates provide coverage for vulnerabilities actively exploited in the wild:
+
+| **KEV Source** | **Templates** | **Description** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **454** | [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - Enhanced vulnerability intelligence |
+| 🟢 **Both Sources** | **407** | Templates covering vulnerabilities in both catalogs |
+
+> 💡 **Total unique KEV templates: 1496** - Use `nuclei -tags kev,vkev` to scan for actively exploited vulnerabilities
+
+---
## Nuclei Templates Top 10 statistics
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------|
-| cve | 3288 | dhiyaneshdk | 1882 | http | 8967 | info | 4190 | file | 435 |
-| panel | 1342 | daffainfo | 868 | cloud | 657 | high | 2446 | dns | 26 |
-| xss | 1257 | princechaddha | 854 | file | 435 | medium | 2379 | | |
-| wordpress | 1181 | dwisiswant0 | 806 | dast | 255 | critical | 1425 | | |
-| exposure | 1107 | ritikchaddha | 649 | workflows | 202 | low | 318 | | |
-| wp-plugin | 1032 | pussycat0x | 532 | code | 198 | unknown | 56 | | |
-| osint | 841 | pikpikcu | 352 | network | 145 | | | | |
-| tech | 803 | pdteam | 310 | javascript | 71 | | | | |
-| rce | 786 | pdresearch | 269 | ssl | 38 | | | | |
-| lfi | 777 | iamnoooob | 257 | dns | 23 | | | | |
+| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 |
+| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 |
+| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | |
+| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | |
+| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | |
+| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | |
+| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | |
+| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | |
+| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | |
+| osint | 848 | iamnoooob | 263 | dns | 23 | | | | |
-**848 directories, 11344 files**.
+**873 directories, 11997 files**.
|
diff --git a/README_CN.md b/README_CN.md
index 251f1386a40..af4ccb0a833 100644
--- a/README_CN.md
+++ b/README_CN.md
@@ -42,24 +42,38 @@ Nuclei 模板
-|
+ |
-## Nuclei模板TOP10统计信息
+### 🚨 已知被利用漏洞 (KEV) 覆盖范围
+
+Nuclei 模板为野外被积极利用的漏洞提供覆盖:
+
+| **KEV 来源** | **模板数量** | **描述** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **454** | [CISA 已知被利用漏洞目录](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 增强的漏洞情报 |
+| 🟢 **两个来源** | **407** | 覆盖两个目录中漏洞的模板 |
+
+> 💡 **唯一 KEV 模板总数: 1496** - 使用 `nuclei -tags kev,vkev` 扫描被积极利用的漏洞
+
+---
+
+## Nuclei Templates Top 10 statistics
| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------|
-| cve | 2877 | dhiyaneshdk | 1477 | http | 8219 | info | 3948 | file | 404 |
-| panel | 1246 | daffainfo | 866 | file | 404 | high | 2135 | dns | 25 |
-| wordpress | 1072 | dwisiswant0 | 803 | cloud | 370 | medium | 1840 | | |
-| exposure | 1006 | princechaddha | 570 | workflows | 192 | critical | 1197 | | |
-| xss | 987 | ritikchaddha | 496 | code | 157 | low | 287 | | |
-| wp-plugin | 936 | pussycat0x | 453 | network | 138 | unknown | 43 | | |
-| osint | 807 | pikpikcu | 353 | javascript | 65 | | | | |
-| tech | 745 | pdteam | 302 | ssl | 30 | | | | |
-| lfi | 727 | ricardomaia | 245 | dast | 26 | | | | |
-| misconfig | 720 | geeknik | 231 | dns | 22 | | | | |
+| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 |
+| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 |
+| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | |
+| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | |
+| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | |
+| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | |
+| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | |
+| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | |
+| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | |
+| osint | 848 | iamnoooob | 263 | dns | 23 | | | | |
-**743 directories, 9960 files**.
+**873 directories, 11997 files**.
|
diff --git a/README_JA.md b/README_JA.md
index b0d5375ef35..2855cd207bb 100644
--- a/README_JA.md
+++ b/README_JA.md
@@ -37,24 +37,38 @@ Nucleiテンプレートプロジェクトの概要であり、ユニークな
-|
+ |
-## Nuclei テンプレート トップ10統計
+### 🚨 既知の悪用される脆弱性 (KEV) カバレッジ
-| タグ | 数 | 著者 | 数 | ディレクトリ | 数 | 重大度 | 数 | 種類 | 数 |
-|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------|
-| cve | 1325 | daffainfo | 629 | cves | 1306 | info | 1398 | http | 3644 |
-| panel | 604 | dhiyaneshdk | 509 | exposed-panels | 613 | high | 955 | file | 76 |
-| lfi | 490 | pikpikcu | 322 | vulnerabilities | 506 | medium | 784 | network | 50 |
-| xss | 451 | pdteam | 269 | technologies | 273 | critical | 445 | dns | 17 |
-| wordpress | 409 | geeknik | 187 | exposures | 254 | low | 211 | | |
-| exposure | 360 | dwisiswant0 | 169 | token-spray | 230 | unknown | 7 | | |
-| cve2021 | 324 | 0x_akoko | 157 | misconfiguration | 210 | | | | |
-| rce | 319 | princechaddha | 149 | workflows | 187 | | | | |
-| wp-plugin | 304 | pussycat0x | 130 | default-logins | 102 | | | | |
-| tech | 286 | gy741 | 126 | file | 76 | | | | |
+Nucleiテンプレートは、野生で積極的に悪用されている脆弱性のカバレッジを提供します:
-**286個のディレクトリ、4012個のファイル**。
+| **KEV ソース** | **テンプレート数** | **説明** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **454** | [CISA 既知の悪用される脆弱性カタログ](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 強化された脆弱性インテリジェンス |
+| 🟢 **両方のソース** | **407** | 両方のカタログの脆弱性をカバーするテンプレート |
+
+> 💡 **ユニークKEVテンプレート総数: 1496** - `nuclei -tags kev,vkev` を使用して積極的に悪用されている脆弱性をスキャン
+
+---
+
+## Nuclei Templates Top 10 statistics
+
+| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
+|-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------|
+| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 |
+| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 |
+| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | |
+| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | |
+| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | |
+| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | |
+| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | |
+| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | |
+| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | |
+| osint | 848 | iamnoooob | 263 | dns | 23 | | | | |
+
+**873 directories, 11997 files**.
|
diff --git a/README_KR.md b/README_KR.md
index e60e2dc36dc..820e533d589 100644
--- a/README_KR.md
+++ b/README_KR.md
@@ -31,7 +31,7 @@ Nuclei 템플릿
템플릿은 실제 스캐닝 엔진을 동작하게 하는 [nuclei scanner](https://github.com/projectdiscovery/nuclei)의 핵심입니다.
이 저장소는 우리 팀에서 제공하거나, 커뮤니티에서 기여한 다양한 템플릿들을 저장하고 보관합니다.
-**pull requests** 나 [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+)를 통해 템플릿을 보내주시는 기여도 환영합니다.
+템플릿 목록을 증가시키기 위해서 **pull requests** 나 [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) 를 통해 기여해주시기를 부탁드립니다.
## Nuclei 템플릿 개요
@@ -39,24 +39,38 @@ Nuclei 템플릿
-|
+ |
-## Nuclei 템플릿 통계 Top 10
+### 🚨 알려진 악용되는 취약점 (KEV) 적용 범위
-| 태그 | 개수 | 작성자 | 개수 | 디렉토리 | 개수 | 심각도 | 개수 | 종류 | 개수 |
+Nuclei 템플릿은 실제로 악용되고 있는 취약점에 대한 적용 범위를 제공합니다:
+
+| **KEV 소스** | **템플릿 수** | **설명** |
+|----------------|---------------|-----------------|
+| 🔴 **CISA KEV** | **454** | [CISA 알려진 악용되는 취약점 카탈로그](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) |
+| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 강화된 취약점 인텔리전스 |
+| 🟢 **두 소스 모두** | **407** | 두 카탈로그의 취약점을 포함하는 템플릿 |
+
+> 💡 **총 고유 KEV 템플릿: 1496** - `nuclei -tags kev,vkev`를 사용하여 적극적으로 악용되는 취약점 스캔
+
+---
+
+## Nuclei Templates Top 10 statistics
+
+| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT |
|-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------|
-| cve | 3288 | dhiyaneshdk | 1882 | http | 8967 | info | 4190 | file | 435 |
-| panel | 1342 | daffainfo | 868 | cloud | 657 | high | 2446 | dns | 26 |
-| xss | 1257 | princechaddha | 854 | file | 435 | medium | 2379 | | |
-| wordpress | 1181 | dwisiswant0 | 806 | dast | 255 | critical | 1425 | | |
-| exposure | 1107 | ritikchaddha | 649 | workflows | 202 | low | 318 | | |
-| wp-plugin | 1032 | pussycat0x | 532 | code | 198 | unknown | 56 | | |
-| osint | 841 | pikpikcu | 352 | network | 145 | | | | |
-| tech | 803 | pdteam | 310 | javascript | 71 | | | | |
-| rce | 786 | pdresearch | 269 | ssl | 38 | | | | |
-| lfi | 777 | iamnoooob | 257 | dns | 23 | | | | |
+| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 |
+| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 |
+| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | |
+| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | |
+| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | |
+| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | |
+| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | |
+| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | |
+| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | |
+| osint | 848 | iamnoooob | 263 | dns | 23 | | | | |
-**848개 디렉토리, 11344개 파일**.
+**873 directories, 11997 files**.
|
| | | |