Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Problem with WithProxy method #5182

Closed
l1nk3rlin opened this issue May 14, 2024 · 6 comments · Fixed by #5626
Closed

Problem with WithProxy method #5182

l1nk3rlin opened this issue May 14, 2024 · 6 comments · Fixed by #5626
Assignees
Labels
Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors.
Milestone

Comments

@l1nk3rlin
Copy link

l1nk3rlin commented May 14, 2024

use code:

	ne, _ := nuclei.NewNucleiEngine(nuclei.WithTemplatesOrWorkflows(nuclei.TemplateSources{Templates: []string{yourtemplates}}),
		nuclei.WithGlobalRateLimit(150, time.Second),
		nuclei.WithNetworkConfig(nuclei.NetworkConfig{Timeout: 10}),
		nuclei.WithProxy([]string{"socks5://127.0.0.1:7890"}, false),
		//nuclei.WithVerbosity(nuclei.VerbosityOptions{Debug: true}),
	)

go panic:

goroutine 1 [running]:                                                                                                                   
github.com/projectdiscovery/utils/maps.(*SyncLockMap[...]).Get(0xc0010260c8?, {0xc000c0ac20?, 0x10?})                                    
        C:/Users//go/pkg/mod/github.com/projectdiscovery/utils@v0.0.92/maps/synclock_map.go:71 +0x36                               
github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool.wrappedGet(0xc000781808, 0xc001027a80)                           
        C:/Users//go/pkg/mod/github.com/projectdiscovery/nuclei/v3@v3.2.7/pkg/protocols/http/httpclientpool/clientpool.go:175 +0x96
github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool.Get(0xc000781808?, 0xc000c1a100?)                                
        C:/Users//go/pkg/mod/github.com/projectdiscovery/nuclei/v3@v3.2.7/pkg/protocols/http/httpclientpool/clientpool.go:163 +0x4b
github.com/projectdiscovery/nuclei/v3/lib.(*NucleiEngine).init(0xc0013b0e08)                                                             
        C:/Users//go/pkg/mod/github.com/projectdiscovery/nuclei/v3@v3.2.7/lib/sdk_private.go:112 +0xec                             
github.com/projectdiscovery/nuclei/v3/lib.NewNucleiEngine({0xc001027ec0, 0x4, 0xba79e5?})                                                
        C:/Users//go/pkg/mod/github.com/projectdiscovery/nuclei/v3@v3.2.7/lib/sdk.go:276 +0x158                                    
main.ForKeyNucleiRun({0xc00004e240, 0x1a}, {0xc00000a0e8, 0x5}, {0xc00005a0b8?, 0x4829920?})                                             
        C:/Users//Desktop/nucleiv3/main.go:265 +0x2c7                                                                              
main.main()                                                                                                                              
        C:/Users//Desktop/nucleiv3/main.go:144 +0x46
@l1nk3rlin l1nk3rlin added the Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors. label May 14, 2024
@dogancanbakir
Copy link
Member

Could you please try using the 'dev' branch instead?

@dogancanbakir dogancanbakir self-assigned this May 14, 2024
@dogancanbakir dogancanbakir added the Status: Abandoned This issue is no longer important to the requestor and no one else has shown an interest in it. label May 21, 2024
@dogancanbakir
Copy link
Member

Closing this. Feel free to reopen if the issue persists.

@Lcys
Copy link

Lcys commented Sep 12, 2024

Encountered the same problem

@Lcys
Copy link

Lcys commented Sep 12, 2024

@dogancanbakir

ne, err := nuclei.NewNucleiEngineCtx(context.Background(), nuclei.DisableUpdateCheck(), nuclei.WithTemplateFilters(nuclei.TemplateFilters{ExcludeSeverities: "info"}), nuclei.WithTemplatesOrWorkflows(nuclei.TemplateSources{Templates: []string{"D:\\nuclei-templates"}}), nuclei.WithProxy([]string{"socks5://192.168.2.245:8080"}, false), )

panic: runtime error: invalid memory address or nil pointer dereference
[signal 0xc0000005 code=0x1 addr=0x14 pc=0x2ab70b6]

goroutine 1 [running]:
github.com/projectdiscovery/utils/maps.(*SyncLockMap[...]).Get(0xc000df5290?, {0xc000050480?, 0x0?})
D:/gopyoject/scan/vendor/github.com/projectdiscovery/utils/maps/synclock_map.go:71 +0x36
github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool.wrappedGet(0xc00049c808, 0xc00103e998)
D:/gopyoject/scan/vendor/github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool/clientpool.go:179 +0x65
github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool.Get(0xc00049c808?, 0xc00103db40?)
D:/gopyoject/scan/vendor/github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool/clientpool.go:171 +0x52
github.com/projectdiscovery/nuclei/v3/lib.(*NucleiEngine).init(0xc0003a5188, {0x413c158, 0x5c72320})
D:/gopyoject/scan/vendor/github.com/projectdiscovery/nuclei/v3/lib/sdk_private.go:112 +0x105
github.com/projectdiscovery/nuclei/v3/lib.NewNucleiEngineCtx({0x413c158, 0x5c72320}, {0xc00103f760, 0x4, 0x1?})
D:/gopyoject/scan/vendor/github.com/projectdiscovery/nuclei/v3/lib/sdk.go:285 +0x15a

@dogancanbakir dogancanbakir reopened this Sep 12, 2024
@dogancanbakir dogancanbakir removed the Status: Abandoned This issue is no longer important to the requestor and no one else has shown an interest in it. label Sep 12, 2024
@dogancanbakir dogancanbakir mentioned this issue Sep 12, 2024
4 tasks
@dogancanbakir
Copy link
Member

@Lcys Thanks for letting us know. Fixed in #5626. Could you retry with that branch?

@Lcys
Copy link

Lcys commented Sep 12, 2024

@dogancanbakir After testing, it works fine. Thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Type: Bug Inconsistencies or issues which will cause an issue or problem for users or implementors.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants