How to integrate Nuclei with Interactsh and Notify

Your vote is:
4.96 of 95 votes

Nuclei Logo

This is my walkthrough for installing Nuclei from ProjectDiscovery and how to integrate a suite of tools to assist with automation tasks. This includes subfinder for subdomain discovery, httpx for probing to validate live hosts, setting up your own self-hosted Interactsh server for OOB (out-of-band) testing, and how to install and configure Notify for the convenience of alerting on any identified vulnerabilities via external channels such as email, Slack, Discord, and Telegram.

Throughout this guide I'll be using a standard Kali image, though you can of course use whichever flavour of Linux you prefer.



  1. Install Golang

    sudo apt install golang

  2. Update Golang

    git clone
    cd update-golang
    sudo ./

  3. Set the golang environment module to auto

    go env -w GO111MODULE=auto

  4. Install go

    sudo tar -C /usr/local/ -xzf go1.17.5.linux-amd64.tar.gz

  5. Set the path variable within the bashrc file

    echo 'export GOROOT=/usr/local/go' >> .bashrc
    echo 'export GOPATH=$HOME/go' >> .bashrc
    echo 'export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH' >> .bashrc

  6. Refresh the bashrc file

    source ~/.bashrc

Install the following suite of tools (these are my baseline for optimal automation).


We need to set up a self-hosted Interactsh server to enable secure testing of OOB (out-of-band) vulnerabilities. To get started we need our own remote VPS. For this guide I’ll be using a Digital Ocean droplet.

  1. Install Interactsh

    go install -v

  2. First, create a Digital Ocean account if you don’t have one already. Then in the top-right of your account dashboard, click to create a droplet.

    Create a droplet

  3. Choose a droplet image (for this example I've opted to use Debian).

    Choose a droplet image

  4. Select a droplet plan (for this example I’ve opted to go with basic).

    Select a droplet plan

  5. Select a CPU (for this example I've opted for a single CPU).

    Select a CPU

  6. Select the region where your desired VPS will reside (for this example I’ve opted for London).

    Select a datacentre region

  7. Select an authentication protocol for droplet access (for this example I’ve selected a root password).

    Select an authentication protocol

  8. Now we can create our droplet.

    Create a droplet button

  9. Once the droplet is created, we should take note of the public IP address, as we’ll need this later.

    View droplet info

  10. Now we can click the three dots to access the droplet console.

    Access droplet console

  11. Then proceed to access the console via our web browser and login as root, using the password we defined earlier (in step 7).

    Launch droplet console

  12. Install Interactsh on remote VPS droplet

    sudo apt update
    sudo apt install golang

    go env -w GO111MODULE=auto

    sudo tar -C /usr/local/ -xzf go1.17.5.linux-amd64.tar.gz

    echo 'export GOROOT=/usr/local/go' >> .bashrc
    echo 'export GOPATH=$HOME/go' >> .bashrc
    echo 'export PATH=$GOPATH/bin:$GOROOT/bin:$HOME/.local/bin:$PATH' >> .bashrc

    source ~/.bashrc

  13. Register and configure the desired domain

    Next we need to register our desired domain name with our preferred domain registrar. In this guide I’ll be demonstrating the process using GoDaddy with my domain I selected for my OOB testing:

    First we need to login to GoDaddy, navigate to our account home page, and then scroll down to our domains and click Set up to configure the desired domain DNS settings.

    Set up desired domain

  14. Now we click on Add and navigate to Host Names.

    Configure DNS records

  15. Now we add our desired hostnames, which in this case will be directing NS1 and NS2 to the public IP address of our droplet.

    Configure nameservers

  16. Now we can navigate back to our DNS Management page and scroll down to Nameservers. As these are configured to the default GoDaddy nameservers, we want to change them.

    Change nameservers settings

    Edit nameservers settings

  17. Now we can enter our custom nameservers for our domain.

    Enter custom nameservers

    Once the nameserver configuration is saved, we will need to wait for DNS propagation to complete in the background, which usually takes a few hours. Once this is done, our OOB testing server is ready to deploy.

  18. Afterwards, we can login to our droplet, and start the server.

    interactsh-server -domain

    Start the Interactsh server

    At this stage the server is live and listening for any OOB interactions.

  19. To configure the server for secure communication with the client, we can leverage the -auth flag to generate an authentication token, which will remain valid for the duration of the session.

    interactsh-server -domain -auth

    Generate the auth token


  1. Install Nuclei

    go install -v

  2. Run nuclei for the first time to install the templates.

    Run Nuclei


  1. Install Subfinder

    go install -v

  2. Now we need to add API keys to the Subfinder configuration file. Run subfinder for the first time to generate the default config file.

    Run Subfinder

  3. Now we can open and edit the configuration file.
    sudo nano ~/.config/subfinder/config.yaml

    Scroll to the bottom of the file and add your API keys for the corresponding third-party service providers. If you do not yet have API keys for the named service providers, you will need to register an account at each one and copy over the API key they issue you.

    Once completed, your configuration file should look something like this:

    Edit Subfinder API keys

    Save and exit.


  1. Install httpx

    go install -v


In this example I’ll be demonstrating how to set up Notify for Discord. These steps are similar for the alternative channels which are currently supported such as Slack and Telegram.

  1. Install Notify

    go install -v

  2. Set up the Notify configuration file
    sudo mkdir ~/.config/notify
    cd ~/.config/notify

  3. Create a Discord server

    Create a Discord server

  4. Choose a server name

    Choose a Discord server name

  5. Edit channel within server

    Edit channel within server

  6. Change channel name to notifications

    Change channel name to notifications

  7. Navigate to Integrations and create a web hook for the channel

    Create a web hook for channel

  8. Enter the desired bot name and copy the web hook URL to clipboard

    Copy bot web hook

  9. Now open and edit the configuration file
    sudo nano provider-config.yaml

    Enter the following:
         - id: "Discord Server for Nuclei Alerts"
           discord_channel: "notifications"
           discord_username: "Notify Bot"
           discord_format: "{{data}}"
           discord_webhook_url: "[PASTE WEBHOOK URL HERE]"

    Notify config file

    Save and exit.

Ready to go

Now we can begin using the suite of tools together.

First we want to initialise our Interactsh client.
interactsh-client -v -server -token [INTERACTSH SERVER TOKEN]

Initialise Interactsh client

The client communicates with the server to generate a unique subdomain ‘payload’ for OOB testing. This will listen for OOB interactions, and with the -v flag present will provide verbose logging within the terminal window for any requests it receives.

With the Interactsh client generated subdomain, and the Interactsh server generated auth token, we can feed these values into our Nuclei command to include OOB testing in our scans.

For example:
subfinder -d -o subdomains.txt | httpx -list subdomains.txt | nuclei -stats -l subdomains.txt -t takeovers/ -t cves/ -iserver "" -itoken "ac3dc1c75be69feb5a6a2d4bf126cff3b1a4fb4f8cf2f28fb8a827745302ceaf" -o vulns.txt; notify -data vulns.txt -bulk

I will briefly break down the arguments in this command below:

subfinder will enumerate the subdomains of the designated target domain and write all the subdomains it finds to a subdomains.txt file.

httpx will then probe the subdomains to validate which ones are alive.

Nuclei will then ingest the alive subdomains, run each subdomain URL through the defined template scans (in this case to check for subdomain takeovers and any vulnerabilities corresponding to known CVEs), and then output any logged findings to a vulns.txt file.

With the self-hosted Interactsh instance specified, Nuclei will auto-correlate the requests it makes with any OOB interactions it identifies on the listening Interactsh server.

Once the Nuclei scanning is complete, Notify will then parse the vulns.txt file and send a bulk alert over the webhook to the corresponding notification channel (in this case alerts will arrive in the Discord channel we set up earlier).


Jacob Riggs

Jacob Riggs is a senior cyber security professional based in the UK with over a decade of experience working to improve the cyber security of various private, public, and third sector organisations. His contributions focus on expanding encryption tools, promoting crypto-anarchist philosophy, and pioneering projects centred on leveraging cryptography to protect the privacy and political freedoms of others.

E3FE 4B44 56F5 69BE 76C1 E169 E3C7 0A52 9AEF DB6F

Subscribe to my Blog

I agree with the Privacy Policy terms.