In-House Tools Used

icon picker
Rengine

Description

reNgine is a web application reconnaissance suite with focus on a highly configurable streamlined recon process via Engines, recon data correlation, continuous monitoring, recon data backed by a database, and a simple yet intuitive User Interface. With features such as sub-scan, deeper co-relation, report generation, etc. reNgine aims to fix the gap in the traditional recon tools and probably a better alternative for existing commercial tools.
reNgine makes it easy for penetration testers and security auditors to gather reconnaissance data with bare minimal configuration.

Features

Reconnaissance: Subdomain Discovery, IP and Open Ports Identification, Endpoints Discovery, Directory and Files fuzzing, - Screenshot gathering, Vulnerability scan using Nuclei, WHOIS Identification, WAF Detection etc.
Highly configurable YAML based Scan Engines
Support for Parallel Scans and Subscans
Automatically report Vulnerabilities to Hackerone
Recon Data visualization
OSINT Capabilities (Meta info Gathering, Employees Gathering, Email Address with an option to look password in the leaked database, - dorks, etc)
Customizable Alerts/Notification on Slack, Discord, and Telegram
Perform Advanced Query lookup using natural language alike and, or, not operations
Recon Notes and Todos
Clocked Scans (Run reconnaissance exactly at X Hours and Y minutes) and Periodic Scans (Runs reconnaissance every X minutes/- hours/days/week)
Proxy Support
Screenshot Gallery with Filters
Powerful recon data filtering with autosuggestions
Recon Data changes, finds new/removed subdomains/endpoints
Tag targets into the Organization
Identify Interesting Subdomains
Custom GF patterns and custom Nuclei Templates
Edit tool-related configuration files (Nuclei, Subfinder, Naabu, amass)
Add external tools from Github/Go
Interoperable with other tools, Import/Export Subdomains/Endpoints
Import Targets via IP and/or CIDRs
Report Generation
Toolbox: Comes bundled with most commonly used tools such as whois lookup, CMS detector, CVE lookup, etc.
Identification of related domains and related TLDs for targets
Find actionable insights such as Most Common Vulnerability, Most Common CVE ID, Most Vulnerable Target/Subdomain, etc.

Quick Installation

(Only Ubuntu/Kali/VPS)
Clone this repo
git clone https://github.com/yogeshojha/rengine && cd rengine

2. Edit the dotenv file, please make sure to change the password for postgresql POSTGRES_PASSWORD
nano .env
3. Run the installation script, Please keep an eye for any prompt, you will also be asked for username and password for reNgine.
sudo ./install.sh

if ./install.sh does not have install permission, please change it, chmod +x install.sh
reNgine can now be accessed from or if you're on the VPS

Installation (Mac/Windows/Other)

Installation instructions can be found at


Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.