Back to Templates

Automated CVE Scanning of Bug Bounty Programs with Nuclei and Project Discovery

Created by

Created by: Javier Rieiro || pyus3r

Javier Rieiro

Last update

Last update 17 hours ago

Categories

Share


Description

Automates daily CVE-driven scanning against bug bounty scopes. It fetches bug-bounty domains, pulls newly published Project Discovery templates, converts them to Nuclei rules, runs targeted scans, and emails findings.

Objective

Help security researchers and bug bounty hunters discover exploitable instances quickly by automatically running the latest public templates from Project Discovery against a consolidated bug-bounty scope. Reduce manual steps and maintain continuous reconnaissance.

How it works

  1. The workflow accepts or fetches a domain list that covers HackerOne, Bugcrowd, Intigriti, and YesWeHack.
  2. It downloads the latest public templates from Project Discovery.
  3. For each new template published since the last run it: creates a file, uploads it to a remote host, and converts it to a Nuclei-compatible YAML.
  4. It uploads a consolidated domains wordlist to the remote host.
  5. It executes Nuclei with the new templates against the domains list using configured flags (concurrency, rate limits, severity tags).
  6. It collects and deduplicates Nuclei output.
  7. If results exist, it sends the findings via Gmail.

Requirements

• SSH access (root or equivalent) to a VPS or host.
• Nuclei installed on the remote host.
• Gmail OAuth2 credentials for sending notifications.
• Recommended: VPS with enough CPU and network capacity for concurrent scanning when scope is large.