
Rishi contributed extensively to the projectdiscovery/nuclei-templates repository, building and refining over 39 detection templates across domains such as web security, OSINT, and network scanning. He engineered solutions for vulnerability detection and asset exposure by leveraging YAML, Docker Compose, and DNS reconnaissance, focusing on template development and metadata enrichment to improve accuracy and maintainability. His work included enhancing detection logic, standardizing template naming, and integrating regex-based extraction for more reliable results. By addressing both functional and organizational challenges, Rishi delivered robust, reusable templates that accelerated automated security assessments and streamlined triage, demonstrating depth in security research and configuration management.

October 2025: Delivered a comprehensive expansion of nuclei-templates coverage, adding and refining templates across multiple enterprise-relevant platforms. The work enhances visibility into vulnerabilities and misconfigurations, accelerates triage, and supports risk-based prioritization by delivering both new templates and significant metadata improvements. The month also focused on improving detection accuracy and coverage for commonly exploited applications, resulting in more reliable signals for incident response and security operations.
October 2025: Delivered a comprehensive expansion of nuclei-templates coverage, adding and refining templates across multiple enterprise-relevant platforms. The work enhances visibility into vulnerabilities and misconfigurations, accelerates triage, and supports risk-based prioritization by delivering both new templates and significant metadata improvements. The month also focused on improving detection accuracy and coverage for commonly exploited applications, resulting in more reliable signals for incident response and security operations.
September 2025 monthly summary focusing on key features delivered, major accomplishments, and business impact. Two new templates were added to the nuclei-templates repository to enhance reconnaissance and detection capabilities, enabling faster, automated security assessments and improved coverage for deployments. Key features delivered: - OWASP NEST User Enumeration Template: adds a GET request to the members endpoint and validates a 200 response with the expected URL pattern to identify active users, improving reconnaissance capabilities for security assessments. (Commit: b84075e21f38f8f2be9e21c4ce729265b375964b) - Drift DNS TXT Signature Detection: adds a detection signature for the Drift service by checking DNS TXT records for the drift-domain-verification string, expanding detection of Drift deployments. (Commit: f650ac1bf5c8e02e0ebe21a04556e0c5a9472246) Overall value: - Accelerated security testing workflows with two purpose-built templates, reducing manual validation time and increasing detection coverage for common service deployments. - Clean, focused commits that support easy review and reuse by the template library community. Technologies/skills demonstrated: - Nuclei template authoring and validation logic (HTTP GET flows, URL pattern checks) - DNS TXT record-based detection signatures - Git-based collaboration and clear commit naming - Template library maintenance and reuse across security assessments
September 2025 monthly summary focusing on key features delivered, major accomplishments, and business impact. Two new templates were added to the nuclei-templates repository to enhance reconnaissance and detection capabilities, enabling faster, automated security assessments and improved coverage for deployments. Key features delivered: - OWASP NEST User Enumeration Template: adds a GET request to the members endpoint and validates a 200 response with the expected URL pattern to identify active users, improving reconnaissance capabilities for security assessments. (Commit: b84075e21f38f8f2be9e21c4ce729265b375964b) - Drift DNS TXT Signature Detection: adds a detection signature for the Drift service by checking DNS TXT records for the drift-domain-verification string, expanding detection of Drift deployments. (Commit: f650ac1bf5c8e02e0ebe21a04556e0c5a9472246) Overall value: - Accelerated security testing workflows with two purpose-built templates, reducing manual validation time and increasing detection coverage for common service deployments. - Clean, focused commits that support easy review and reuse by the template library community. Technologies/skills demonstrated: - Nuclei template authoring and validation logic (HTTP GET flows, URL pattern checks) - DNS TXT record-based detection signatures - Git-based collaboration and clear commit naming - Template library maintenance and reuse across security assessments
August 2025: Delivered DNS TXT Record Detection Template Enhancement for nuclei-templates, improving categorization and discoverability with a new 'txt-service' tag, and tightened detection logic by fixing the 'whimsical' word list formatting and refining template metadata and detection patterns. No major bugs were reported for this repository this month. The changes enhance detection accuracy, speed up triage, and support future template quality initiatives.
August 2025: Delivered DNS TXT Record Detection Template Enhancement for nuclei-templates, improving categorization and discoverability with a new 'txt-service' tag, and tightened detection logic by fixing the 'whimsical' word list formatting and refining template metadata and detection patterns. No major bugs were reported for this repository this month. The changes enhance detection accuracy, speed up triage, and support future template quality initiatives.
Month: 2025-07 — Delivered expanded detection coverage and improved accuracy across key templates in nuclei-templates, enhancing security posture for customers. Key features delivered include Cisco exposure detection templates for Cisco Unified Communications Manager (Unified CM) Console and Prime License Manager, with console exposure detection via GET /ccmadmin/showHome.do; status checks and reference URL included; minor UI label tweaks. Added OSINT templates for Luma with improvements and cleanup, including a dedicated Luma OSINT detector and removal of outdated templates. Do-Not-Track policy detection improvements, strengthening body matchers and enforcing an all-words-required condition for higher accuracy. Exposure detection templates across multiple protocols (ATProto DID, MTA-STS, Nostr JSON, OAuth metadata, PKI) with formatting and linting refinements. Overall, the month expanded coverage, improved detection accuracy, and reduced stale templates, contributing to safer configurations and faster risk assessment.
Month: 2025-07 — Delivered expanded detection coverage and improved accuracy across key templates in nuclei-templates, enhancing security posture for customers. Key features delivered include Cisco exposure detection templates for Cisco Unified Communications Manager (Unified CM) Console and Prime License Manager, with console exposure detection via GET /ccmadmin/showHome.do; status checks and reference URL included; minor UI label tweaks. Added OSINT templates for Luma with improvements and cleanup, including a dedicated Luma OSINT detector and removal of outdated templates. Do-Not-Track policy detection improvements, strengthening body matchers and enforcing an all-words-required condition for higher accuracy. Exposure detection templates across multiple protocols (ATProto DID, MTA-STS, Nostr JSON, OAuth metadata, PKI) with formatting and linting refinements. Overall, the month expanded coverage, improved detection accuracy, and reduced stale templates, contributing to safer configurations and faster risk assessment.
June 2025 — Nuclei Templates: Delivered three new/updated OSINT templates and fixed a domain accuracy issue to improve threat detection coverage and accuracy for the nuclei-templates repository. Key deliverables include Discord invite exposure detection, magnet link detection enhancements, and Sessionize user enumeration, along with a domain correction for Threads OSINT to ensure alignment with active site targeting. These changes expand detection capabilities, streamline triage, and reinforce OSINT workflows with regex-based extraction and robust URL validation.
June 2025 — Nuclei Templates: Delivered three new/updated OSINT templates and fixed a domain accuracy issue to improve threat detection coverage and accuracy for the nuclei-templates repository. Key deliverables include Discord invite exposure detection, magnet link detection enhancements, and Sessionize user enumeration, along with a domain correction for Threads OSINT to ensure alignment with active site targeting. These changes expand detection capabilities, streamline triage, and reinforce OSINT workflows with regex-based extraction and robust URL validation.
May 2025 monthly summary focusing on key accomplishments and measurable impact across the nuclei-templates repository. Delivered two targeted enhancements to detection capabilities and performed a non-functional cleanup to improve maintainability and readability.
May 2025 monthly summary focusing on key accomplishments and measurable impact across the nuclei-templates repository. Delivered two targeted enhancements to detection capabilities and performed a non-functional cleanup to improve maintainability and readability.
April 2025: Delivered eight new detection templates in nuclei-templates, expanding coverage to seized-domain detection, onion services, login panels, torrent sites, Android App Links, and verification templates. Standardized template naming/IDs and enhanced matching logic (new word matchers and OR-logic) to improve accuracy and maintainability. Introduced Onion-Location header-based detection and standard naming for onion templates. Implemented additional detection for Fortinet FortiSwitch and CentreStack login panels to identify exposed devices. Expanded AssetLinks (Android App Links) and Do Not Track policy detection with associated metadata and tagging. Added Keybase ownership verification template and related refinements. Completed targeted quality fixes (e.g., trailing-space removal) and metadata/documentation updates. Overall impact: broader detection coverage, higher reliability of asset exposure detection, and improved developer experience through consistency and better documentation.
April 2025: Delivered eight new detection templates in nuclei-templates, expanding coverage to seized-domain detection, onion services, login panels, torrent sites, Android App Links, and verification templates. Standardized template naming/IDs and enhanced matching logic (new word matchers and OR-logic) to improve accuracy and maintainability. Introduced Onion-Location header-based detection and standard naming for onion templates. Implemented additional detection for Fortinet FortiSwitch and CentreStack login panels to identify exposed devices. Expanded AssetLinks (Android App Links) and Do Not Track policy detection with associated metadata and tagging. Added Keybase ownership verification template and related refinements. Completed targeted quality fixes (e.g., trailing-space removal) and metadata/documentation updates. Overall impact: broader detection coverage, higher reliability of asset exposure detection, and improved developer experience through consistency and better documentation.
March 2025: Delivered the EMQX Default Credentials Detection Template for Nuclei in the nuclei-templates-labs repository. The feature adds a dedicated template to detect default login credentials on EMQX servers, supported by a comprehensive README with vulnerability context, exploitation steps, and reproducible testing guidance, including a docker-compose setup to deploy a vulnerable EMQX instance for testing. Validation included local testing and alignment with repository contribution standards. This work enhances security testing workflows by enabling rapid detection of misconfigured EMQX deployments and provides a reproducible test environment for auditors and developers.
March 2025: Delivered the EMQX Default Credentials Detection Template for Nuclei in the nuclei-templates-labs repository. The feature adds a dedicated template to detect default login credentials on EMQX servers, supported by a comprehensive README with vulnerability context, exploitation steps, and reproducible testing guidance, including a docker-compose setup to deploy a vulnerable EMQX instance for testing. Validation included local testing and alignment with repository contribution standards. This work enhances security testing workflows by enabling rapid detection of misconfigured EMQX deployments and provides a reproducible test environment for auditors and developers.
February 2025: Expanded SSO-detection capabilities in nuclei-templates, delivering five new detection templates to identify common SSO panels (Dex, Shibboleth, Pomerium, Veracore, and SuperTokens) and a configuration pathway for the Dex panel. Also refined detection accuracy through Shodan-based query improvements, enhancing reliable identification of SSO deployments and improving telemetry.
February 2025: Expanded SSO-detection capabilities in nuclei-templates, delivering five new detection templates to identify common SSO panels (Dex, Shibboleth, Pomerium, Veracore, and SuperTokens) and a configuration pathway for the Dex panel. Also refined detection accuracy through Shodan-based query improvements, enhancing reliable identification of SSO deployments and improving telemetry.
Month: 2024-12. This monthly summary highlights the delivery and impact from the nuclei-templates repo. Key deliverable: a new Cleo Technology Detection Template that detects Cleo technologies (VLTrader, Harmony, LexiCom) by inspecting HTTP response headers and extracting version information for each detected technology. No major bugs fixed this month. Impact: expands technology fingerprinting coverage, enabling faster triage and more accurate remediation prioritization in downstream security workflows. Technical achievements: template-based detection capability in nuclei-templates, header inspection logic, version extraction, and maintainable template authoring with traceable commits.
Month: 2024-12. This monthly summary highlights the delivery and impact from the nuclei-templates repo. Key deliverable: a new Cleo Technology Detection Template that detects Cleo technologies (VLTrader, Harmony, LexiCom) by inspecting HTTP response headers and extracting version information for each detected technology. No major bugs fixed this month. Impact: expands technology fingerprinting coverage, enabling faster triage and more accurate remediation prioritization in downstream security workflows. Technical achievements: template-based detection capability in nuclei-templates, header inspection logic, version extraction, and maintainable template authoring with traceable commits.
In 2024-10, focused on enhancing detection capabilities for the FlexMLS WordPress plugin within projectdiscovery/nuclei-templates, delivering precise version extraction and outdated-version matching, plus organizational improvements to the YAML detection workflow. This work increases scanning accuracy for WordPress plugins, reduces exposure for customers, and enhances maintainability of the detection templates.
In 2024-10, focused on enhancing detection capabilities for the FlexMLS WordPress plugin within projectdiscovery/nuclei-templates, delivering precise version extraction and outdated-version matching, plus organizational improvements to the YAML detection workflow. This work increases scanning accuracy for WordPress plugins, reduces exposure for customers, and enhances maintainability of the detection templates.
Overview of all repositories you've contributed to across your timeline