ReNgine Upgrade: New Sub-Analysis Feature, PDF Reports, Expanded Toolkit Showcased at Black Hat USA

Open-source recognition tool automates some of the most time-consuming pen testing tasks

Black Hat USA attendees got a first-hand look at the new and improved ReNgine, which includes several new features for penetration testers and red teamers.

ReEngine is a highly customizable open-source reconnaissance framework that works with other utilities to scan domains, list endpoints, and search directories.

Security professionals can use the tool to create a pipeline that pulls together more complex queries from scan engines and presents the results in a single window.

CONTEXT ReNgine: open-source reconnaissance tool automates information-gathering process for pen testers

With 4,500 stars on GitHub, ReNgine has steadily grown in popularity over the past few months, largely due to the constant addition of new features to help pen testers with their daily tasks.

The developer of the tool is Yogesh Ojha, a security professional working on web and mobile applications. Its goal is to automate some of the most time-consuming research operations, as well as bring together open-source hacking tools.

“There are several open source recognition tools on the market,” Ojha said. The daily sip. “What sets ReNgine apart from other tools is the easy-to-use web interface, ability to customize scan engines based on targets, UI/UX, and easy integration on VPS with minimal setup .”

New features

Launched in time for Black Hat USA, and featured at Arsenal sessions Wednesday, August 10, ReNgine version 1.3.0 includes several new features.

The first is a unique sub-analysis feature that allows users to analyze all target subdomains more deeply.

“Once the subdomain scan is complete, you can choose one or more subdomains and submit further port scans, vulnerability scans, or any available scans,” Ojha explained.

“The added benefit of the sub-scan feature is that for larger targets such as, you don’t have to wait for the full scan to complete. One can simply perform a scan of subdomain and perform further sub-crawls on those subdomains.

Learn about the latest hacking tools

ReNgine 1.3.0 also comes with a highly customizable PDF report feature, which allows users to choose report type, look and feel.

Meanwhile, a new toolbox feature for ReNgine allows pen testers to integrate tools like WHOIS lookup and WAF detector without needing to add a URL/domain as targets. More toolkits are on the way.

Among the various UI/UX improvements in ReNgine 1.1, column filtering “was one of the most requested features,” Ojha said.

“Column filtering allows users to focus on what’s important in the subdomains, endpoints, and vulnerability results table section. This allows users to hide and show certain columns. »

Ojha added, “In a nutshell, the new ReNgine upgrade makes it more than just a recognition tool. The latest update aims to fill the gap in traditional recognition tools and probably a much better alternative for some of the commercial vulnerability recognition and assessment tools.

YOU MIGHT ALSO LIKE Latest Web Hacking Tools – Q3 2022

Comments are closed.