reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation, and organization, continuous monitoring, backed by a database, and a simple yet intuitive User Interface.
reNgine makes it easy for penetration testers to gather reconnaissance and gather vulnerabilities with minimal configuration and with the help of reNgine’s correlation, it just makes recon effortless.
reNgine has some of the most advanced features on any recon tools like data correlation and organization, the custom query “like” language for recon data filtering, screenshot gallery with filtering options, powerful and highly configurable scan engines, customizable notifications to discord, slack or telegram, automatic vulnerability reporting to Hackerone, support for GF pattern matching, OSINT, Recon Data Visualization, Support for Recon Notes and Todos, Perform Advanced Query lookup using natural language alike and, or, not operations, and proxy support.
reNgine also introduces the ability to automatically find interesting subdomains, tagging targets, and find recon data changes, like how many subdomains are newly discovered or no longer exist and also reNgine supports Clocked Scans (Run reconnaissance exactly at X Hours and Y minutes) and Periodic Scans (Runs reconnaissance every X minutes/hours/days/week)
reNgine aims to address the shortcomings of traditional recon workflow using these features.
This tool demo/talk will be a walkthrough on reNgine, on how organizations or individuals could make the best out of reNgine for continuous monitoring and reconnaissance.
Research Engineer TRG.
Creator of reNgine, an open-source automated reconnaissance framework. reNgine is an automated reconnaissance framework for web applications with focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by database and simple yet intuitive User Interface.