{"id":1938,"date":"2023-03-07T08:42:57","date_gmt":"2023-03-07T08:42:57","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=1938"},"modified":"2023-05-31T18:57:03","modified_gmt":"2023-05-31T18:57:03","slug":"nuclei-malware-a-new-tool-for-malware-researchers","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/","title":{"rendered":"Nuclei Malware: A New Tool for Malware Researchers"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<h2>What is Nuclei?<\/h2>\n<p>Before we explain about <a href=\"https:\/\/secry.me\/explore\/tools\/nuclei-malware-a-new-tool-for-malware-researchers\/\">Nuclei Malware<\/a>, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for discovering security vulnerabilities in web applications. Its ability to support multiple protocols such as HTTP, DNS, SSH, and others makes it a versatile tool for various kinds of testing. One of the key features that make NUCLEI stand out from other similar tools is its pre-configured scan rules, also known as NUCLEI Templates. These templates are designed to automate the scanning process, thereby making it more efficient and saving time and effort. NUCLEI templates are made up of YAML files that define how a particular test should be conducted, the type of data to collect, and the kind of issues to look for. With NUCLEI, security experts can perform comprehensive web application security testing and detect vulnerabilities before they can be exploited by malicious individuals.<\/p>\n<p>&nbsp;<\/p>\n<h2>Nuclei Malware<\/h2>\n<p>In the world of cybersecurity, there are many tools available to help security professionals detect and analyze malware. One such tool is <strong>Nuclei<\/strong>, which is typically used by penetration testers and bug hunters.<br \/>\nHowever, one vulnerability researcher, <strong>Muhammad Daffa<\/strong>, has found a new use for Nuclei to detecting malware called <a href=\"https:\/\/secry.me\/explore\/tools\/nuclei-malware-a-new-tool-for-malware-researchers\/\">Nuclei Malware<\/a>.<\/p>\n<p><strong>Muhammad Daffa <\/strong>from Indonesia has created a repository on GitHub <a href=\"https:\/\/github.com\/daffainfo\/nuclei-malware\"><em><strong>https:\/\/github.com\/daffainfo\/nuclei-malware<\/strong> <\/em><\/a>that contains templates to detect various types of malware using Nuclei. The templates are based on references from the <strong>yara<\/strong> rules repository and can be used by other malware researchers to detect malware.<\/p>\n<p>The repository of Nuclei Malware includes a section on the status of each rule, indicating whether it can be made into a nuclei template or not. This makes it easy for researchers to understand which templates they can use to detect specific types of malware.<\/p>\n<p>To demonstrate the effectiveness of the <a href=\"https:\/\/secry.me\/explore\/tools\/nuclei-malware-a-new-tool-for-malware-researchers\/\">Nuclei Malware<\/a> templates that he made, Daffa has also created a video that shows how they can be used Nuclei Malware to detect the malware. The video provides a step-by-step guide on how to use the templates of Nuclei Malware.<\/p>\n<p><iframe loading=\"lazy\" title=\"How to Detect a Malware Using Nuclei\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/QpH5e7qDolw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p>Overall, the Nuclei Malware repository created by Muhammad Daffa is a valuable resource for malware researchers looking to detect and analyze new types of malware. The <a href=\"https:\/\/secry.me\/explore\/tools\/nuclei-malware-a-new-tool-for-malware-researchers\/\">Nuclei Malware<\/a> templates provided in the repository are based on well-established rules and can be easily used with Nuclei.<\/p>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban_overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for discovering security vulnerabilities in web applications. Its ability to support multiple protocols such as HTTP, DNS, SSH, and others makes it a versatile tool for various kinds of testing. One of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[194,201],"tags":[186,188,187],"class_list":{"0":"post-1938","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"category-tools","9":"tag-malware","10":"tag-nuclei-template","11":"tag-virus"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Nuclei Malware: A New Tool for Malware Researchers | SECRY<\/title>\n<meta name=\"description\" content=\"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nuclei Malware: A New Tool for Malware Researchers | SECRY\" \/>\n<meta property=\"og:description\" content=\"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-07T08:42:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T18:57:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/03\/NUCLEI-MALWARE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Nuclei Malware: A New Tool for Malware Researchers\",\"datePublished\":\"2023-03-07T08:42:57+00:00\",\"dateModified\":\"2023-05-31T18:57:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/\"},\"wordCount\":408,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/NUCLEI-MALWARE.png\",\"keywords\":[\"Malware\",\"Nuclei Template\",\"Virus\"],\"articleSection\":[\"Cyber Security\",\"Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/\",\"name\":\"Nuclei Malware: A New Tool for Malware Researchers | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/NUCLEI-MALWARE.png\",\"datePublished\":\"2023-03-07T08:42:57+00:00\",\"dateModified\":\"2023-05-31T18:57:03+00:00\",\"description\":\"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/NUCLEI-MALWARE.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/NUCLEI-MALWARE.png\",\"width\":1280,\"height\":720,\"caption\":\"Nuclei Malware: A New Tool for Malware Researchers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/nuclei-malware-a-new-tool-for-malware-researchers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nuclei Malware: A New Tool for Malware Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Nuclei Malware: A New Tool for Malware Researchers | SECRY","description":"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/","og_locale":"en_US","og_type":"article","og_title":"Nuclei Malware: A New Tool for Malware Researchers | SECRY","og_description":"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for","og_url":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-03-07T08:42:57+00:00","article_modified_time":"2023-05-31T18:57:03+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/03\/NUCLEI-MALWARE.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Nuclei Malware: A New Tool for Malware Researchers","datePublished":"2023-03-07T08:42:57+00:00","dateModified":"2023-05-31T18:57:03+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/"},"wordCount":408,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/03\/NUCLEI-MALWARE.png","keywords":["Malware","Nuclei Template","Virus"],"articleSection":["Cyber Security","Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/","url":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/","name":"Nuclei Malware: A New Tool for Malware Researchers | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/03\/NUCLEI-MALWARE.png","datePublished":"2023-03-07T08:42:57+00:00","dateModified":"2023-05-31T18:57:03+00:00","description":"What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/03\/NUCLEI-MALWARE.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/03\/NUCLEI-MALWARE.png","width":1280,"height":720,"caption":"Nuclei Malware: A New Tool for Malware Researchers"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/nuclei-malware-a-new-tool-for-malware-researchers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Nuclei Malware: A New Tool for Malware Researchers"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/1938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=1938"}],"version-history":[{"count":24,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/1938\/revisions"}],"predecessor-version":[{"id":2573,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/1938\/revisions\/2573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/1942"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=1938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=1938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=1938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}