reNgine is a web application reconnaissance suite with focus on a highly configurable streamlined recon process via Engines, recon data correlation, continuous monitoring, recon data backed by a database, and a simple yet intuitive User Interface. With features such as sub-scan, deeper co-relation, report generation, etc. reNgine aims to fix the gap in the traditional recon tools and probably a better alternative for existing commercial tools.
reNgine makes it easy for penetration testers and security auditors to gather reconnaissance data with bare minimal configuration.
Features
Reconnaissance: Subdomain Discovery, IP and Open Ports Identification, Endpoints Discovery, Directory and Files fuzzing, - Screenshot gathering, Vulnerability scan using Nuclei, WHOIS Identification, WAF Detection etc.
Highly configurable YAML based Scan Engines
Support for Parallel Scans and Subscans
Automatically report Vulnerabilities to Hackerone
Recon Data visualization
OSINT Capabilities (Meta info Gathering, Employees Gathering, Email Address with an option to look password in the leaked database, - dorks, etc)
Customizable Alerts/Notification on Slack, Discord, and Telegram
Perform Advanced Query lookup using natural language alike and, or, not operations
Recon Notes and Todos
Clocked Scans (Run reconnaissance exactly at X Hours and Y minutes) and Periodic Scans (Runs reconnaissance every X minutes/- hours/days/week)
Proxy Support
Screenshot Gallery with Filters
Powerful recon data filtering with autosuggestions
Recon Data changes, finds new/removed subdomains/endpoints