Watch NahamSec explain why subfinder is still his favorite tool for subdomain discovery 👇 #cybersecurity #hacking #subfinder #subdomaindiscovery
ProjectDiscovery
Computer and Network Security
San Francisco, California 18,312 followers
We detect real vulnerabilities with zero noise. Powered by Nuclei for fast, attacker-like detections. Request a demo!
About us
ProjectDiscovery helps security teams detect real, exploitable vulnerabilities without the noise. We combine open source power with enterprise-grade scale, starting with Nuclei, our fast, customizable vulnerability scanner trusted by thousands of engineers. Nuclei delivers attacker-like detections using conditional logic, enabling teams to move beyond version matching and catch what truly matters. Trusted by teams at Elastic, Vercel, and thousands more, ProjectDiscovery brings open-source flexibility to enterprise workflows, enabling full visibility and faster remediation in minutes with zero setup friction. Start with Nuclei. Scale with ProjectDiscovery.
- Website
 - 
        
                  
    
      https://projectdiscovery.io
      
    
  
                  
External link for ProjectDiscovery
 - Industry
 - Computer and Network Security
 - Company size
 - 11-50 employees
 - Headquarters
 - San Francisco, California
 - Type
 - Privately Held
 - Founded
 - 2020
 - Specialties
 - Attack Surface Management, Vulnerability Detection, Automated Security Workflows, Remediation, and Application Security
 
Locations
- 
                  
                    Primary
                  
                Get directions
548 Market St
San Francisco, California 94104, US
 
Employees at ProjectDiscovery
- 
              
    
    
    
    
    
      
        
      
          
      
Hemant Mohapatra
Partner, Lightspeed; past: @a16z, @Google, engineering @AMD
 - 
              
    
    
    
    
    
      
        
      
          
      
Chad M.
Early Stage/High Growth CRO, Angel Investor and Sales Advisor helping early stage founders take their product to market and drive sustainable…
 - 
              
    
    
    
    
    
      
        
      
          
      
Robin Vasan
Enterprise Software Seed Investor
 - 
              
    
    
    
    
    
      
        
      
          
      
Daniel Miessler 🛡️
Building AI that upgrades humans and organizations. [SECURITY | AI | PURPOSE]
 
Updates
- 
              
        
    
Creating templates could not be easier - make ready-to-go templates on our cloud platform just by providing a URL Watch the video below and sign up here 👇 https://lnkd.in/gRdVnHT2 #cybersecurity #hacking #projectdiscovery #ai
 - 
              
        
    
Want a quick way to install and keep Project Discovery tools up to date? Use pdtm 👇 #cybersecurity #hacking #projectdiscovery #bugbounty
 - 
              
        
    
This Hacktoberfest, the Nuclei community leveled up templates in a big way: 243 new templates and 178 CVEs including 44 KEVs; thanks to 287 PRs, 16 new contributors, and 24 bounties awarded. Open-source security just got stronger. 💪 Full write-up + what to scan next → https://lnkd.in/gN5Kq3-C #OpenSource #Security #Nuclei #Hacktoberfest #CVE #KEV
 - 
              
        
    
How do you protect the sensitive data of 15 million students across a massive portfolio of educational applications? That's the challenge Amplify a leader in K–12 education, was facing. They needed a solution to scale security testing across hundreds of applications without relying on slow, generic tools. Among their key challenges: ✅ Scanning applications behind authentication, a major limitation of traditional tools. ✅ Identifying complex, application-specific vulnerabilities that generic scanners miss. ✅ Creating a repeatable process to ensure patched vulnerabilities don't return. ✅ Reducing the workload on a central security team stretched thin by manual testing. The solution for Amplify was an innovative approach using ProjectDiscovery's tools. By converting bug bounty reports into custom Nuclei templates, they created an automated, targeted testing framework that replicated real-world attacks. Want to learn how they secured their growing platform? Read the full case study (🔗 in the comments)👇
 - 
                  
 - 
              
        
    
Want to build a next-gen security program? It starts with automation. Here’s how to build an automated security program around four core areas of concern: 1️⃣ Asset Discovery: You can’t secure what you can't see. Find every part of your external attack surface using tools like subfinder, dnsx, and Chaos. 2️⃣ Asset Enrichment: Once you know what’s there, identify what’s running on it. Automating this process is key to keeping up with a constantly changing threat environment using tools like httpx, naabu, katana, and cloudlist. 3️⃣ Vulnerability Detection: Not all vulnerabilities are created equal. Use a powerful tool like Nuclei to filter through the noise and find the signal of what truly matters. 4️⃣ Remediation and Regression Protection: Finding a vulnerability is only half the battle. A modern program must track issues until they're fixed and use automation to ensure they never come back. Ready to learn more? Read the full article here 👇
 - 
              
        
    
CISA has added two DELMIA Apriso vulnerabilities we discovered; CVE-2025-6204 (code injection → RCE) and CVE-2025-6205 (missing authorization)to the Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation. In our original research (Sept 23), we showed how these issues chain from unauthenticated user creation to authenticated file upload path traversal, leading to full application compromise. We also published nuclei templates to help teams detect exposure quickly. Read the deep dive and grab the templates: https://lnkd.in/gZrQCR3E #KEV #Manufacturing #OTSecurity #AppSec #nuclei #IncidentResponse
 - 
              
        
    
Looking for a better way to store and manage your Nuclei scan results? In version 3.3.5, we've added MongoDB support to Nuclei! This feature allows you to export all your scan results to a MongoDB database for enhanced storage and reporting. Watch this one-minute video to see how it works 👇
ProjectDiscovery Tips and Tricks - MongoDB!
https://www.youtube.com/
 - 
              
        
    
Tired of false positives from fuzzing? The Analyzer in Nuclei adds an extra verification step to confirm your findings and prove the vulnerability is real. More about the Analyzer in our Fuzzing overview👇 https://lnkd.in/gWtua9Ae
 - 
              
        
    
ProjectDiscovery reposted this
You have likely heard of tools like Subfinder or Nuclei, right? They are amazing tools from ProjectDiscovery, but if you haven't been keeping up with them, you might be missing a lot in your recon strategy. That's why we launched this new Hub, tying together all these tools using a single methodology that will change your game. 🌀Get started: https://lnkd.in/gN3hmYAX
 -