reNgine is a web application reconnaissance suite focusing on a highly configurable streamlined recon process via Engines, recon data correlation, continuous monitoring, recon data backed by a database, and a simple yet intuitive User Interface. With features such as sub-scan, deeper co-relation, report generation, etc. reNgine aims to fix the gap in the traditional recon tools and probably a better alternative for existing commercial tools.
Version
1.1
Date
24 April 2022
Description of breaking changes
reNgine 1.1 Release Trailer [Watch Here]
Changelog
Redesigned UI
Added Subscan Feature
Subscan allows further scanning of any subdomains. Assume from a normal recon process you identified a subdomain that you wish to do a port scan. Earlier, you had to add that subdomain as a target. Now you can just select the subdomain and initiate a sub-scan.
Ability to Download reconnaissance or vulnerability report
Added option to customize the report, customization includes the look and feel of the report, executive summary, etc.
Add IP Address from IP
WHOIS Addition on Detail Scan and fetch whois automatically on Adding Single Targets
Universal Search Box
Addition of Quick Add menus
Added ToolBox Feature
The toolBox will feature the most commonly used recon tools. One can use these tools to identify whois, CMSDetection, etc without adding targets. Currently, Whois, CMSDetector, and CVE ID lookup are supported. More tools to follow up.
Notify New Releases on reNgine if available
Tools Arsenal Section to feature preinstalled and custom tools
Ability to Update preinstalled tools from Tools Arsenal Section
Ability to download/add custom tools
Added option for Custom Header on Scan Engine
Added CVE_ID, CWE_ID, CVSS Score, CVSS Metrics on Vulnerability Section, this also includes lookup using cve_id, cwe_id, cvss_score etc
Added curl command and references in the Vulnerability Section
Added Columns Filtering Option on Subdomain, Vulnerability, and Endpoints Tables
Added Error Handling for Failed Scans, reason for failure scan will be displayed
Thanks for submitting. Sorry we couldn't include your project in the April Release Radar, as that had already shipped. Please definitely submit again for version 2.0 and we'd love to consider your project 😄
Open Source Project name
reNgine
What is your project?
reNgine is a web application reconnaissance suite focusing on a highly configurable streamlined recon process via Engines, recon data correlation, continuous monitoring, recon data backed by a database, and a simple yet intuitive User Interface. With features such as sub-scan, deeper co-relation, report generation, etc. reNgine aims to fix the gap in the traditional recon tools and probably a better alternative for existing commercial tools.
Version
1.1
Date
24 April 2022
Description of breaking changes
reNgine 1.1 Release Trailer [Watch Here]
Changelog
Redesigned UI
Added Subscan Feature
Subscan allows further scanning of any subdomains. Assume from a normal recon process you identified a subdomain that you wish to do a port scan. Earlier, you had to add that subdomain as a target. Now you can just select the subdomain and initiate a sub-scan.
Ability to Download reconnaissance or vulnerability report
Added option to customize the report, customization includes the look and feel of the report, executive summary, etc.
Add IP Address from IP
WHOIS Addition on Detail Scan and fetch whois automatically on Adding Single Targets
Universal Search Box
Addition of Quick Add menus
Added ToolBox Feature
The toolBox will feature the most commonly used recon tools. One can use these tools to identify whois, CMSDetection, etc without adding targets. Currently, Whois, CMSDetector, and CVE ID lookup are supported. More tools to follow up.
Notify New Releases on reNgine if available
Tools Arsenal Section to feature preinstalled and custom tools
Ability to Update preinstalled tools from Tools Arsenal Section
Ability to download/add custom tools
Added option for Custom Header on Scan Engine
Added CVE_ID, CWE_ID, CVSS Score, CVSS Metrics on Vulnerability Section, this also includes lookup using cve_id, cwe_id, cvss_score etc
Added curl command and references in the Vulnerability Section
Added Columns Filtering Option on Subdomain, Vulnerability, and Endpoints Tables
Added Error Handling for Failed Scans, reason for failure scan will be displayed
Added Related Domains using WHOIS
Added Related TLDs
Added HTTP Status Breakdown Widget
Added CMS Detector
Updated Visualization
Option to Download Selected Subdomains
Added additional Nuclei Templates from https://github.com/geeknik/the-nuclei-templates
Added SSRF check from Nagli Nuclei Template
Added option to fetch CVE_ID details
Added option to Delete Multiple Scans
Added ffuf as Directory and Files fuzzer -Added Geographic Distribution of Assets Map
Added widgets such as Most vulnerable Targets, Most Common Vulnerabilities, Most Common CVE IDs, Most Common CWE IDs, Most Common Vulnerability Tags
Other minor fixes
GitHub Repo
https://github.com/yogeshojha/rengine
Website
https://rengine.wiki
Link to changelog
https://rengine.wiki/changelog/
Social media
https://twitter.com/ojhayogesh11/status/1518542337219375104
Anything else to add?
Release Trailer: https://www.youtube.com/watch?v=iy_6F7Vq8Lo
You guys fly to the moon ;) Thank you for this initiative