Real-World Impact of Security Exposures
Recent high-profile breaches demonstrate why continuous security monitoring is crucial:- Capital One (2019): Attackers exploited a misconfigured web application firewall and SSRF vulnerability to access an exposed AWS S3 bucket, stealing sensitive customer data.
- Uber (2016/2017): Hackers discovered cloud access credentials accidentally committed in a GitHub repository, using them to access AWS and extract millions of user and driver records.
- Equifax (2017): An unpatched Apache Struts vulnerability (CVE-2017-5638) in a public-facing web application allowed remote code execution, compromising personal data of around 143 million people.
- Colonial Pipeline (2021): A legacy VPN account without multi-factor authentication was exploited using stolen credentials, granting attackers access to the network and triggering a ransomware attack.
- Panera Bread (2018): An unsecured API endpoint exposed customer data in plain text, enabling attackers to enumerate records via sequential IDs and scrape millions of user profiles.
Platform Overview
ProjectDiscovery is a security platform that combines powerful open-source tools with a cloud-based service to help you secure your infrastructure. It offers a hybrid approach where you can use a user-friendly cloud interface or command-line tools (CLI) – or both – to suit your workflow. With ProjectDiscovery, you can:- Discover your assets – Identify all your external-facing systems, domains, cloud resources, and more
- Scan for vulnerabilities – Use automated, up-to-date vulnerability checks to find exploitable issues
- Monitor exposures continuously – Keep an eye on your external and internal risks in real-time
- Automate security tasks – Integrate with APIs and workflows to alert your team when issues are found
Cloud Platform
Get started with our cloud platform for instant asset discovery and continuous monitoring
Open Source Tools
Explore our powerful CLI tools for security testing and automation
New to ProjectDiscovery? Sign up for free to start securing your infrastructure.
Quick Navigation
Asset Discovery
Learn how to discover and manage your external attack surface
Vulnerability Scanning
Set up automated vulnerability scanning and continuous monitoring
Template Creation
Create custom security checks using our template framework
Cloud Integration
Connect cloud providers and third-party services
Getting Started with Cloud
ProjectDiscovery Cloud makes it easy to discover and scan assets without managing any infrastructure. Follow these steps to get started quickly:- Sign Up and Log In: Create a free account on the ProjectDiscovery Cloud platform (go to cloud.projectdiscovery.io and sign up). After verifying your email, log in to access the Cloud dashboard.
-
Add Your Assets: Once in the dashboard, start your asset discovery by adding a root domain or organization name. For example, add
yourcompany.com
as a root domain. The platform will automatically enumerate subdomains, IP addresses, and related assets linked to that domain. You can add up to a certain number of domains for free — e.g. your company’s main domains. ProjectDiscovery will use its scanners behind the scenes to give you an instant inventory of your external assets. - Initiate a Vulnerability Scan: After your assets are discovered, launch an automated vulnerability scan in the cloud platform. You can navigate to the Scans section, select your asset or asset group, and start a Nuclei scan (Nuclei is the engine that runs vulnerability templates). Use the default template set to scan for a wide range of common issues. The scan runs in the cloud, testing your assets for exploitable vulnerabilities (like misconfigurations, outdated software, and known CVEs).
- Continuous Monitoring: ProjectDiscovery Cloud will continuously monitor your assets without further input. This means if a new subdomain appears tomorrow or a new critical vulnerability emerges in the template feed, the platform can automatically discover and scan it. You can also schedule regular scans (e.g. daily or weekly) for ongoing coverage. Essentially, once your assets are added, the cloud platform keeps an eye on them and updates findings in real-time.
- Review Findings and Alerts: Check the Dashboard or Reports section to review the results. You’ll see any vulnerabilities found, categorized by severity, with details for each finding. For example, if an exposed admin panel or a known CVE was detected, it will be listed with information on the affected asset. From here, you can prioritize what to fix first. ProjectDiscovery Cloud also lets you set up real-time alerts – for instance, you can configure notifications via Email, Slack, or Microsoft Teams to be alerted the moment a high-severity issue is discovered. This ensures your team is notified immediately about critical risks.
Getting Started with CLI
If you prefer working in a terminal or want to integrate scans into your own environment, ProjectDiscovery’s CLI tools are for you. This section will help you install the essential tools and run basic scans for asset discovery and security testing. 1. Install the CLI Tools: ProjectDiscovery’s open-source tools are written in Go, so you’ll need to have Go (v1.20+ recommended) installed on your system. There are two convenient ways to install the tools:-
Use the Tool Manager (PDTM): The ProjectDiscovery Tool Manager (PDTM) is a utility to install and update all tools easily. If you have Go, you can install PDTM by running:
After installation, run
pdtm -ia
(install all) to automatically download and set up all ProjectDiscovery CLI tools. This one command gives you access to Nuclei, Subfinder, HTTPx, and many more tools in one go. -
Install Individually: Alternatively, you can install tools individually. For example:
This will fetch the latest Subfinder, HTTPx, and Nuclei binaries into your
$GOPATH/bin
. (You can also find pre-built binaries on the ProjectDiscovery GitHub or use package managers like Homebrew on macOS.)
bin
path is in your PATH
environment variable so you can run the tools from any directory. Once installed, you can verify by running subfinder -h
, httpx -h
, and nuclei -h
to see the help output.
2. Asset Discovery with Subfinder: To immediately see value from the CLI, start by discovering assets. For example, to find subdomains of a target domain:
subdomains.txt
. In seconds, you’ll get a list of domains that are part of the target’s attack surface. (You can also run subfinder -d example.com
without the -o
flag to just print results to the screen.)
3. Probing Assets with HTTPx: Often, you’ll want to know which of those discovered domains are alive and what web technologies they are running. HTTPx can take a list of hostnames and probe them for active web services:
-title
and -status-code
flags tell HTTPx to fetch the page title and HTTP status code for each host, and -silent
removes verbose headers for clean output. The results saved in live_hosts.txt
will show you which subdomains are up, and give a hint of what each is (for example, a status 200 and a title “Login Portal” might indicate a login page). This helps you focus on active targets.
4. Vulnerability Scanning with Nuclei: Now for the real value – finding vulnerabilities. Nuclei is a fast vulnerability scanner that uses template files to check targets for hundreds of known issues. You can run Nuclei against a single URL or a list:
live_hosts.txt
for a broad range of vulnerabilities. Nuclei will output any findings to the console and also save them to findings.txt
. Each finding will include the URL, the name of the vulnerability detected (based on the template that matched), and a severity level. For a quick test, you could also run nuclei directly on a single URL, e.g., nuclei -u https://example.com
, to see if any common issues are present.
After running these tools, you should have: a list of your assets (subdomains), a list of active systems, and any potential vulnerabilities discovered. Even as a beginner, within a few minutes you’ve used the CLI to map out a target and identify possible security issues – demonstrating the immediate value of ProjectDiscovery’s tools.
(Tip: All ProjectDiscovery tools come with various options. For instance, you can update Nuclei templates with nuclei -update-templates
, or limit scan scope by severity. As you grow more comfortable, you can customize these tools for more targeted results.)
Key Workflows & Use Cases
Asset Discovery & Management
Automatically discover and track assets across your infrastructure
Real-time Vulnerability Scanning
Continuously scan for and detect security vulnerabilities
Exposure Management
Monitor and manage security exposures in real-time
Infrastructure Security
Secure cloud and on-premise infrastructure
Asset Discovery
The first step in securing your attack surface is knowing what assets you have. ProjectDiscovery simplifies asset discovery by automatically finding and inventorying assets across your domains and cloud environments. In the Cloud platform, you can start with a few root domains, and the system will continuously discover all subdomains, related hosts, and even cloud infrastructure tied to those domains. This gives you an up-to-date inventory of external-facing assets (websites, APIs, servers, etc.) without manual effort. On the CLI side, tools like Subfinder (for subdomains) and Cloudlist (for cloud resources) let you script out asset discovery as well. By quickly building a comprehensive asset list, you ensure that no part of your external infrastructure is overlooked.Real-time Vulnerability Scanning
Once you have an asset inventory, the next workflow is to find exploitable vulnerabilities on those assets – ideally before attackers do. ProjectDiscovery’s approach focuses on real-time, template-driven scanning. The Cloud platform continuously runs vulnerability scans using the latest Nuclei templates contributed by the community and ProjectDiscovery researchers, so it can catch newly disclosed issues fast. You can perform on-demand scans (for example, after a new deployment) or schedule regular scans across all assets. In practice, this means if a critical vulnerability (say, a new RCE in a popular software) is added to the templates, ProjectDiscovery can detect it on your systems within minutes of its disclosure. Using the CLI, you can integrate Nuclei into your CI/CD or scripts to scan specific targets (for instance, scanning every new build of an application before release). The result is a proactive vulnerability management process – you’re finding and fixing weaknesses in real time, rather than reacting after an incident.Exposure Management
Security isn’t a one-time effort. Exposure management is about continuously monitoring for changes or new risks in your environment, both external and internal, and responding quickly. ProjectDiscovery Cloud excels here by offering continuous monitoring of your attack surface. Once you’ve added your assets, it will keep checking for things like new subdomains popping up, services changing, or new vulnerabilities arising. If an exposure is found – for example, an open database becomes visible or an internal server starts exposing a port – the platform can send you immediate alerts. You can configure real-time notifications via your preferred channels (Email, Slack, Microsoft Teams, or custom webhooks) for various events. This real-time awareness is crucial for catching misconfigurations or shadow IT (unknown assets) before they become major incidents. Additionally, ProjectDiscovery supports internal exposure monitoring: you can run internal network scans (using Nuclei or Naabu for ports) and feed the results into the platform to ensure even behind-the-firewall assets are tracked. In short, exposure management with ProjectDiscovery means you always have an eye on your security posture and can react to new threats or changes as they happen.Infrastructure Security
Modern organizations run on complex infrastructure – multiple cloud providers, containers, on-prem networks, etc. ProjectDiscovery helps with infrastructure security by scanning your cloud and network environments for misconfigurations and risks. Through its integrations (and tools like Cloudlist), ProjectDiscovery Cloud can enumerate assets from AWS, GCP, Azure, and others, identifying things like misconfigured S3 buckets, public-facing VMs, or open network ports. For example, you can connect your AWS account and automatically retrieve a list of IPs, hostnames, and services you have, then have Nuclei scan them for known cloud-specific vulnerabilities. The platform’s built-in port scanner (powered by Naabu) can check all your asset IPs for open ports (1-65535) to uncover services you might not realize are exposed. On the CLI side, you can similarly use Naabu for port scanning and feed those results into Nuclei or other tools for deeper analysis. Importantly, ProjectDiscovery also supports scanning internal infrastructure by letting you run scans within your network and upload the results to the cloud platform. This means even if certain systems aren’t reachable from the outside, you can still include them in your security assessment. Infrastructure security use cases include checking your cloud accounts for open admin ports, ensuring no dev database is inadvertently open to the internet, and verifying that all your critical services are configured securely. ProjectDiscovery provides the tools to automate these checks across your entire tech stack.Automation & Integration
API Documentation
Integrate ProjectDiscovery into your workflows using our REST APIs
Platform Integrations
Connect with ticketing, alerting, and cloud services
Additional Resources
Community
Join our active community for support and discussions
GitHub
Explore our open-source tools and contribute
Blog
Read about security research and tool updates
Next Steps & Resources
You’ve just scratched the surface of what ProjectDiscovery can do. Here are some next steps and resources to continue your journey:-
Official Documentation:
- Explore the comprehensive docs at docs.projectdiscovery.io
- Cloud Platform Overview
- Asset Discovery Guide
- Vulnerability Scanning Guide
- API Documentation
-
Community Support:
- Join the ProjectDiscovery Discord for real-time discussions
- Visit our GitHub Discussions for technical questions
- Follow us on Twitter for updates
- Report issues on GitHub
-
Tutorials & Examples:
- Watch our “All ProjectDiscovery Tools in 30 Minutes” video
- Learn about Template Creation
- Explore Cloud Integrations
- Read our Technical Blog
- Check Template Examples
-
Nuclei Templates & Open Source:
- Browse the Nuclei Templates Repository
- Learn about Contributing Templates
- Use the Template Editor
- Explore Template Syntax
-
Integration Guides:
- Set up Cloud Provider Integrations
- Configure Notification Systems
- Implement Ticketing Integration
- Use Custom Webhooks
- Learn about API Integration