-
Notifications
You must be signed in to change notification settings - Fork 2.4k
137 lines (137 loc) · 6.87 KB
/
templates-sync.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
name: Sync Repositories Workflow
on:
push:
paths:
- '.new-additions'
- 'cloud/aws/sns/sns-public-subscribe-access.yaml'
- 'dast/vulnerabilities/sqli/time-based-sqli.yaml'
- 'file/malware/hash/anthem-deeppanda-malware-hash.yaml'
- 'file/malware/hash/applejeus-malware-hash.yaml'
- 'file/malware/hash/avburner-malware-hash.yaml'
- 'file/malware/hash/backwash-malware-hash.yaml'
- 'file/malware/hash/blackenergy-driver-amdide-hash.yaml'
- 'file/malware/hash/blackenergy-driver-malware-hash.yaml'
- 'file/malware/hash/blackenergy-killdisk-malware-hash.yaml'
- 'file/malware/hash/blackenergy-ssh-malware-hash.yaml'
- 'file/malware/hash/blackenergy-vbs-malware-hash.yaml'
- 'file/malware/hash/bluelight-malware-hash.yaml'
- 'file/malware/hash/bluetermite-emdivi-malware-hash.yaml'
- 'file/malware/hash/bluetermite-emdivi-sfx-hash.yaml'
- 'file/malware/hash/charmingcypress-malware-hash.yaml'
- 'file/malware/hash/cheshirecat-malware-hash.yaml'
- 'file/malware/hash/cloudduke-malware-hash.yaml'
- 'file/malware/hash/codoso-gh0st-malware.yaml'
- 'file/malware/hash/codoso-malware-hash.yaml'
- 'file/malware/hash/codoso-pgv-malware-hash.yaml'
- 'file/malware/hash/codoso-plugx-malware-hash.yaml'
- 'file/malware/hash/disgomoji-malware-hash.yaml'
- 'file/malware/hash/dubnium-malware-hash.yaml'
- 'file/malware/hash/dubnium-sshopenssl-malware-hash.yaml'
- 'file/malware/hash/emissary-malware-hash.yaml'
- 'file/malware/hash/evilbamboo-malware-hash.yaml'
- 'file/malware/hash/fakem-malware-hash.yaml'
- 'file/malware/hash/flipflop-malware-hash.yaml'
- 'file/malware/hash/furtim-malware-hash.yaml'
- 'file/malware/hash/gimmick-malware-hash.yaml'
- 'file/malware/hash/godzilla-webshell-hash.yaml'
- 'file/malware/hash/greenbug-malware-hash.yaml'
- 'file/malware/hash/ico-malware-hash.yaml'
- 'file/malware/hash/industroyer-malware-hash.yaml'
- 'file/malware/hash/ironPanda-htran-malware-hash.yaml'
- 'file/malware/hash/ironpanda-dnstunclient-malware-hash.yaml'
- 'file/malware/hash/ironpanda-malware-hash.yaml'
- 'file/malware/hash/locky-ransomware-hash.yaml'
- 'file/malware/hash/minidionis-readerview-malware-hash.yaml'
- 'file/malware/hash/minidionis-vbs-malware-hash.yaml'
- 'file/malware/hash/naikon-apt-malware-hash.yaml'
- 'file/malware/hash/neuron2-malware-hash.yaml'
- 'file/malware/hash/oilrig-malware-hash.yaml'
- 'file/malware/hash/passcv-ntscan-malware-hash.yaml'
- 'file/malware/hash/passcv-sabre-malware-hash.yaml'
- 'file/malware/hash/passcv-signingcert-malware-hash.yaml'
- 'file/malware/hash/petya-ransomware-hash.yaml'
- 'file/malware/hash/poseidongroup-maldoc-malware-hash.yaml'
- 'file/malware/hash/poseidongroup-malware-hash.yaml'
- 'file/malware/hash/powerstar-malware-hash.yaml'
- 'file/malware/hash/purplewave-malware-hash.yaml'
- 'file/malware/hash/red-leaves-malware-hash.yaml'
- 'file/malware/hash/regeorg-webshell-hash.yaml'
- 'file/malware/hash/revil-ransomware-hash.yaml'
- 'file/malware/hash/rokrat-malware-hash.yaml'
- 'file/malware/hash/sauron-malware-hash.yaml'
- 'file/malware/hash/seaduke-malware-hash.yaml'
- 'file/malware/hash/sfx1-malware-hash.yaml'
- 'file/malware/hash/sfxrar-acrotray-malware-hash.yaml'
- 'file/malware/hash/sharpext-malware-hash.yaml'
- 'file/malware/hash/sofacy-Winexe-malware-hash.yaml'
- 'file/malware/hash/sofacy-bundestag-malware-hash.yaml'
- 'file/malware/hash/sofacy-fybis-malware-hash.yaml'
- 'file/malware/hash/tidepool-malware-hash.yaml'
- 'file/malware/hash/turla-malware-hash.yaml'
- 'file/malware/hash/unit78020-malware-hash.yaml'
- 'file/malware/hash/upstyle-malware-hash.yaml'
- 'file/malware/hash/wildneutron-malware-hash.yaml'
- 'http/cves/2021/CVE-2021-38146.yaml'
- 'http/cves/2021/CVE-2021-38147.yaml'
- 'http/cves/2021/CVE-2021-43831.yaml'
- 'http/cves/2023/CVE-2023-32068.yaml'
- 'http/cves/2023/CVE-2023-37645.yaml'
- 'http/cves/2023/CVE-2023-38194.yaml'
- 'http/cves/2023/CVE-2023-43472.yaml'
- 'http/cves/2023/CVE-2023-45136.yaml'
- 'http/cves/2023/CVE-2023-46732.yaml'
- 'http/cves/2023/CVE-2023-48241.yaml'
- 'http/cves/2023/CVE-2023-50719.yaml'
- 'http/cves/2023/CVE-2023-50720.yaml'
- 'http/cves/2023/CVE-2023-51449.yaml'
- 'http/cves/2023/CVE-2023-6505.yaml'
- 'http/cves/2023/CVE-2023-6786.yaml'
- 'http/cves/2024/CVE-2024-0250.yaml'
- 'http/cves/2024/CVE-2024-0939.yaml'
- 'http/cves/2024/CVE-2024-1728.yaml'
- 'http/cves/2024/CVE-2024-21650.yaml'
- 'http/cves/2024/CVE-2024-23692.yaml'
- 'http/cves/2024/CVE-2024-24112.yaml'
- 'http/cves/2024/CVE-2024-24565.yaml'
- 'http/cves/2024/CVE-2024-2621.yaml'
- 'http/cves/2024/CVE-2024-27718.yaml'
- 'http/cves/2024/CVE-2024-28995.yaml'
- 'http/cves/2024/CVE-2024-29824.yaml'
- 'http/cves/2024/CVE-2024-29895.yaml'
- 'http/cves/2024/CVE-2024-29973.yaml'
- 'http/cves/2024/CVE-2024-31750.yaml'
- 'http/cves/2024/CVE-2024-31982.yaml'
- 'http/cves/2024/CVE-2024-32113.yaml'
- 'http/cves/2024/CVE-2024-3274.yaml'
- 'http/cves/2024/CVE-2024-34982.yaml'
- 'http/cves/2024/CVE-2024-3552.yaml'
- 'http/cves/2024/CVE-2024-36412.yaml'
- 'http/cves/2024/CVE-2024-36837.yaml'
- 'http/cves/2024/CVE-2024-37393.yaml'
- 'http/default-logins/mantisbt/mantisbt-anonymous-login.yaml'
- 'http/exposed-panels/lorex-panel.yaml'
- 'http/exposed-panels/oracle-application-server-panel.yaml'
- 'http/exposed-panels/turnkey-lamp-panel.yaml'
- 'http/exposed-panels/veeam-backup-manager-login.yaml'
- 'http/exposed-panels/wildix-collaboration-panel.yaml'
- 'http/misconfiguration/apache/apache-server-status-localhost.yaml'
- 'http/misconfiguration/cookies-without-secure.yaml'
- 'http/technologies/nperf-server-detect.yaml'
- 'http/technologies/wordpress/plugins/copy-delete-posts.yaml'
- 'http/technologies/wordpress/plugins/image-optimization.yaml'
- 'http/technologies/wordpress/plugins/royal-elementor-addons.yaml'
- 'http/technologies/wordpress/plugins/simple-history.yaml'
- 'http/technologies/wordpress/plugins/sticky-header-effects-for-elementor.yaml'
- 'http/technologies/wordpress/plugins/woocommerce-legacy-rest-api.yaml'
- 'http/vulnerabilities/gradio/gradio-lfi.yaml'
- 'http/vulnerabilities/gradio/gradio-ssrf.yaml'
- 'network/detection/mikrotik-ssh-detect.yaml'
workflow_dispatch:
jobs:
triggerRemoteWorkflow:
if: github.repository == 'projectdiscovery/nuclei-templates'
runs-on: ubuntu-latest
steps:
- name: Trigger Remote Workflow with curl
run: |
curl -i -s -k -X 'POST' -H 'Host: api.github.com' -H "Authorization: token ${{ secrets.GTOKEN }}" --data-binary $'{\"ref\":\"main\"}' 'https://api.github.com/repos/projectdiscovery/early-templates/actions/workflows/reposync.yml/dispatches'