yogeshojha / rengine

reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
https://yogeshojha.github.io/rengine/
GNU General Public License v3.0
7.55k stars 1.14k forks source link

feat: Add Public IP Used for the scan #1162

Open serrapa opened 10 months ago

serrapa commented 10 months ago

Is there an existing feature or issue for this?

Expected feature

It would be useful having a tag of the public ip(s) (maybe it changes during the scan) used for each scan. In this way, you are able to track your scan if using rengine for a red team or pentest... for example like the image below

image

Alternative solutions

No response

Anything else?

No response

github-actions[bot] commented 10 months ago

👋 Hi @serrapa, Issues is only for reporting a bug/feature request. Please read documentation before raising an issue https://rengine.wiki For very limited support, questions, and discussions, please join reNgine Discord channel: https://discord.gg/azv6fzhNCE Please include all the requested and relevant information when opening a bug report. Improper reports will be closed without any response.

AnonymousWP commented 10 months ago

Could you help and open a PR?

k11h-de commented 9 months ago

I would love to see this feature also. @serrapa do you have code in place already (looking at the screenshot - or you have great Photoshop skills) ? If you do not have enahnced the code I may be able to assist. Let me know.

serrapa commented 9 months ago

Hey @k11h-de, I have amazing Photoshot skills :) At the moment, I do not have time to work on this, sorry... so if you plan to work on it, you can start from scratch