To support this, ZeroThreat allows you to import your own Attack Templates and run them alongside the scanner during scans. You can bring in custom templates written in Nuclei syntax or Burp BCheck syntax, making it easy to extend scan coverage with checks that are relevant to your application and testing needs.
Attack Templates are configured at the organization level, so they can be managed centrally and reused across your targets and scans where needed. Once imported, they can be selected through Scan Profiles, which gives you control over which custom templates should run for different targets and scan setups.

You will see two options to add your custom templates:

Use this method to connect your existing GitHub repository directly to ZeroThreat and import custom Attack Templates from it.
Follow these steps:






ZeroThreat will then fetch the templates from the selected repository. You can select which templates to use for scanning from the Scan Profile section.
You can also upload your custom Attack Templates directly as a ZIP file.
Follow these steps:
.zip file containing your custom templates.
Once uploaded, your templates will be listed in the Attack Templates section.
Custom Attack Templates help you extend scanning beyond default platform coverage.
They are useful when you want to:
By combining ZeroThreat scanning with your own curated templates, you can improve coverage for checks that matter most to your environment.
Attack Templates allow you to bring your own Nuclei templates and Burp BChecks into ZeroThreat as an organization-wide capability.
Once imported through GitHub or ZIP upload, these templates can be selected through Scan Profiles and executed alongside the scanner during scans. This helps extend testing coverage with custom checks tailored to your applications, environment, and internal security needs.