Awesome
ScanReflectedSSTI
This script allows to find SSTI vulnerabilities with nuclei, taking advantage of this resource in its maximum analysis capacity.
In the community I have not seen SSTI Fuzzing with nuclei in general, only focused on exploitations by CVE
Testing Fuzzing GET
In the first instance they must collect the urls with the GET parameters.
cat url.txt | nuclei -t ScanSSTI.yaml
nuclei -u 'http://192.168.100.61/xvwa/vulnerabilities/ssti/?name=&submit=' -t ScanSSTI.yaml