MENU

Fun & Interesting

Extracting Data from Targets using Nuclei

ProjectDiscovery 1,975 2 years ago
Video Not Working? Fix It Now

In this video, we are going to learn about nuclei extractors. 🔗 Links Nuclei GitHub: https://nux.gg/nuclei Nuclei Templates GitHub: https://nux.gg/templates Docs: https://nux.gg/nuclei-docs Extractor Syntax Reference: https://github.com/projectdiscovery/nuclei/blob/main/SYNTAX-REFERENCE.md Nuclei Foundation Series Playlist: https://www.youtube.com/watch?v=b5qMyQvL1ZA&list=PLZRbR9aMzTTpItEdeNSulo8bYsvil80Rl Discord: https://nux.gg/discord #projectdiscovery #bugbounty #pentesting #dataextraction #YAML Subscribe: https://www.youtube.com/@projectdiscovery ______________________________________________________ Learn more: Website: https://projectdiscovery.io/ GitHub: https://github.com/projectdiscovery Discord: https://discord.com/invite/projectdiscovery LinkedIn: https://www.linkedin.com/company/projectdiscovery ______________________________________________________ About ProjectDiscovery: When we started, our goal was to make vulnerability detection a very fast and collaborative process. With more than 1,000 contributors, we've grown from a small project into a robust vulnerability automation framework. We now have over 50 million monthly scans from active users in over 100 countries. Empowering many of the top enterprises in their regular vulnerability workflows. We're excited to announce that we are expanding this offering with enterprise-grade SaaS capabilities. We aim to make automation and collaboration even easier, so you can run it on scale without additional tooling. ______________________________________________________ 00:00 Welcome 00:18 What we’ll cover 00:48 What are extractors 01:16 Types of extractors 01:50 Regex and Kval Extractor example 03:20 JSON Extractor example 04:24 XPath and DSL Extractor example 05:29 Dynamic Extractors 07:04 Protocol Variables

Comment