Files
nuclei-templates/http/technologies/admiralcloud-detect.yaml
2025-09-24 11:03:10 +00:00

37 lines
953 B
YAML

id: admiralcloud-detect
info:
name: AdmiralCloud - Detect
author: righettod
severity: info
description: |
AdmiralCloud was detected.
reference:
- https://www.admiralcloud.com/en/
metadata:
verified: true
max-request: 1
shodan-query: http.title:"AdmiralCloud"
tags: tech,admiralcloud,detect
http:
- method: GET
path:
- "{{BaseURL}}"
redirects: true
max-redirects: 2
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains_any(to_lower(body), "content=\"admiralcloud", "<title>admiralcloud")'
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '\s+([0-9\.]+)</title>'
# digest: 4a0a00473045022061d4f5f69c53a3071d305de027a5c66f142852f7c0085995d0b0d8530abf5c59022100bdf8c893d33746efc29651a5b57b9a5f803f4f8a6c6d5c0e33ff11a5bb8de7aa:922c64590222798bb761d5b6d8e72950