Skip to content

Changelog

This section contains the changes happened in reNgine.

Backwards Compatibility Check

Please ensure backwards compatibility before updating reNgine.

Version Backwards Compatible
2.1.1 ✔️ Compatible
2.1.0 ✔️ Compatible
2.0.6 ✔️ Compatible
2.0.5 ✔️ Compatible
2.0.4 ✔️ Compatible
2.0.3 ✔️ Compatible
2.0.2 ✔️ Compatible
2.0.1 ✔️ Compatible
2.0.0 ❌ Not Compatible
1.3.6 ✔️ Compatible
1.3.5 ✔️ Compatible
1.3.4 ✔️ Compatible
1.3.3 ✔️ Compatible
1.3.2 ✔️ Compatible
1.3.1 ✔️ Compatible
1.3.0 ✔️ Compatible
1.2.0 ✔️ Compatible
1.1 ❌ Not Compatible
1.0.1 ✔️ Compatible upto 1.0
1.0 ❌ Not Compatible
0.5.3 ✔️ Compatible
0.5.2 ✔️ Compatible
0.5.1 ✔️ Compatible
0.5 ✔️ Compatible
0.4 ✔️ Compatible
0.3 ✔️ Compatible
0.2 ✔️ Compatible
0.1 ✔️ Compatible

🏷️ 2.1.1

Release Date: July 20, 2024

  • Update contribution guidelines reference by @emmanuel-ferdman in https://github.com/yogeshojha/rengine/pull/1286
  • fix xss on page title fix #1185 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1296
  • fix context key error #1263 #1209 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1294
  • fix xss on vulnerability description payloads #1262 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1298
  • (bug) fix screenshot csv parser #1299 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1300
  • (Security) Fixes #1202 bug risk of leaking the scan result files by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1301
  • Fix #1291 Refactor Makefiles for windows/linux to accomodate both v1 and v2 of docker compose by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1302
  • Fix custom_header to accept multiple headers using custom_headers by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1303
  • Handle hash in url, added navigation for Tabs, Fixes #1155 bug href link with html id does not link to the expected url by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1306
  • Optimize uninstall scripts to perform operations only related to reNgine Fixes # 1187 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1307
  • Added validators to validate URL fixes #1176 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1308
  • Fix LLM/langchain issue for fetching vulnerability report using local LLM model Fixed #1292 local model dont use fetch gpt vulnerability details by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1311
  • Fixes for Clocked and Periodic Scans Fix #1287 Fixes #1015 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1313
  • Fix Not able to add todo from All Subdomains Section Fixes #1310 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1314
  • Fix #1315 Fix for todo URLs not compatible with slugs by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1316
  • Fixes #1122 But in port service lookup that caused multiple entries of Port with same port number but different service name/description by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1317

🏷️ 2.1.0

Release Date: June 22, 2024

  • ARM support
  • Add LLM Toolkit by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1259
  • use django-env by @fopina in https://github.com/yogeshojha/rengine/pull/1230
  • Add Lark to notifications. by @iuime in https://github.com/yogeshojha/rengine/pull/1137
  • Added restart: always to redis container by @null-ref-0000 in https://github.com/yogeshojha/rengine/pull/1275
  • Dockerfile cleanup: reduce image size 3x by @sa7mon in https://github.com/yogeshojha/rengine/pull/1212
  • Support for ARM-based platforms and remove obsolete composer version by @metehan-arslan in https://github.com/yogeshojha/rengine/pull/1242
  • Fix importing CIDR blocks by @pbehnke in https://github.com/yogeshojha/rengine/pull/1205
  • Added SAN extension to the generated certs by @michschl in https://github.com/yogeshojha/rengine/pull/1282
  • Release/2.1.0 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1147
  • Dockerfile Build Multiple Platforms by @vncloudsco in https://github.com/yogeshojha/rengine/pull/1210

🏷️ 2.0.6

Release Date: May 11, 2024

  • Fix installation error and celery workers having issues with httpcore
  • remove duplicate gospider references by @Talanor in https://github.com/yogeshojha/rengine/pull/1245
  • Fix "subdomain" s3 bucket by @Talanor in https://github.com/yogeshojha/rengine/pull/1244
  • Fix Txt File Var Declaration by @specters312 in https://github.com/yogeshojha/rengine/pull/1239
  • Bug Correction: When dumping and loading customscanengines by @TH3xACE in https://github.com/yogeshojha/rengine/pull/1224
  • Fix/infoga removal by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1249
  • Fix #1241 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1251

🏷️ 2.0.5

Release Date: April 20, 2024

  • Fix #1234 reNgine unable to load celery tasks due to mismatched celery and redis versions

🏷️ 2.0.4

Release Date: April 18, 2024

  • chore: update version number to 2.0.3 by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1180
  • Fix various ffuf bugs by @yarysp in https://github.com/yogeshojha/rengine/pull/1199
  • Set and update default YAML config with all latest vars by @yarysp in https://github.com/yogeshojha/rengine/pull/1200
  • Add checks for placeholder in custom tool task by @yarysp in https://github.com/yogeshojha/rengine/pull/1201
  • Whatportis - Replace purge by truncate to prevent port import error by @yarysp in https://github.com/yogeshojha/rengine/pull/1203
  • ops(installation): fix nano not being installed when absent by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1143
  • Complete dev environment to debug/code easily by @yarysp in https://github.com/yogeshojha/rengine/pull/1196
  • Revert "Complete dev environment to debug/code easily" by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1225
  • Update README.md | Fixed 1 broken link to the regine.wiki by @jostasik in https://github.com/yogeshojha/rengine/pull/1226
  • Fix uninitialised variable cmd in custom_subdomain_tools by @cpandya2909 in https://github.com/yogeshojha/rengine/pull/1207
  • [FIX] security: OS Command Injection vulnerability (x2) #1219 by @0xtejas in https://github.com/yogeshojha/rengine/pull/1227

🏷️ 2.0.3

Release Date: January 25, 2024

  • CI: update GitHub action versions by @jxdv in https://github.com/yogeshojha/rengine/pull/1136
  • Fixed (subdomain_discovery | ERROR | local variable 'use_amass_config' referenced before assignment) by @Deathpoolxrs in https://github.com/yogeshojha/rengine/pull/1149
  • chore: update LICENSE by @jxdv in https://github.com/yogeshojha/rengine/pull/1153
  • Fix subdomains list empty in Target by @psyray in https://github.com/yogeshojha/rengine/pull/1166
  • Fix top menu text overflow in low resolution by @psyray in https://github.com/yogeshojha/rengine/pull/1167
  • Update auto comment workflow due to deprecation warnings by @ErdemOzgen in https://github.com/yogeshojha/rengine/pull/1126
  • Change Redirect URL after login to prevent 500 error by @psyray in https://github.com/yogeshojha/rengine/pull/1124
  • fix-1030: Add missing slug on target summary link by @psyray in https://github.com/yogeshojha/rengine/pull/1123

🏷️ 2.0.2

Release Date: December 8, 2023

  • Added tooltip text to dashboard total vulnerabilities tooltip by @luizmlo in https://github.com/yogeshojha/rengine/pull/1029
  • ops(uninstall.sh): add missing volumes and echo messages by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/977
  • Fix no results in target subdomain list by @psyray in https://github.com/yogeshojha/rengine/pull/1036
  • Fix Tool Settings Broken Link by @aqhmal in https://github.com/yogeshojha/rengine/pull/1021
  • Fix subdomains list empty in Target by @psyray in https://github.com/yogeshojha/rengine/pull/1053
  • Raise page limit to 500 for popup list by @psyray in https://github.com/yogeshojha/rengine/pull/1051
  • Add directories count on Directories list by @psyray in https://github.com/yogeshojha/rengine/pull/1050
  • ops(docker-compose): upgrade to 2.23.0 by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1023
  • Fix endpoints list and count by @psyray in https://github.com/yogeshojha/rengine/pull/1041
  • Fix failing visualization when dorks are present by @psyray in https://github.com/yogeshojha/rengine/pull/1045
  • Fix note not saving by @psyray in https://github.com/yogeshojha/rengine/pull/1047
  • Count only not done todos in subdomains list by @psyray in https://github.com/yogeshojha/rengine/pull/1048
  • Fix user agent definition keyword by @psyray in https://github.com/yogeshojha/rengine/pull/1054
  • Upgrade project discovery tool at CT build by @psyray in https://github.com/yogeshojha/rengine/pull/1055
  • Add a check to not load datatables twice by @psyray in https://github.com/yogeshojha/rengine/pull/1039
  • Nmap port scan fails when Naabu return no port by @psyray in https://github.com/yogeshojha/rengine/pull/1067
  • chore(issue-templates): incorrect label name by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1066
  • Endpoints list popup empty by @psyray in https://github.com/yogeshojha/rengine/pull/1070
  • Add missing domain id value in subscan by @psyray in https://github.com/yogeshojha/rengine/pull/1069
  • Fixes for #1033, #1026, #1027 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1071
  • Temporary fix to prevent celery beat crash by @psyray in https://github.com/yogeshojha/rengine/pull/1072
  • fix: ffuf ANSI code processing preventing task to finish by @ocervell in https://github.com/yogeshojha/rengine/pull/1058
  • Update views.py by @Vijayragha1 in https://github.com/yogeshojha/rengine/pull/1074
  • Fix crash on saving endpoint (FFUF related only) by @psyray in https://github.com/yogeshojha/rengine/pull/1063
  • chore(issue-templates): fix incorrect description by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1078
  • IOError -> OSError by @jxdv in https://github.com/yogeshojha/rengine/pull/1081
  • Add directories count on Directories list by @psyray in https://github.com/yogeshojha/rengine/pull/1090
  • chore(issue-template): don't allow blank issues by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1089
  • Fix bad nuclei config name by @psyray in https://github.com/yogeshojha/rengine/pull/1098
  • disallow empty password by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1105
  • fix attribute error on scan history #1103 by @yogeshojha in https://github.com/yogeshojha/rengine/pull/1104
  • issue-633: added already-in-org filter to target dropdown in org form by @SeanOverton in https://github.com/yogeshojha/rengine/pull/1106
  • Update Dockerfile to fix silicon incompatability by @SubGlitch1 in https://github.com/yogeshojha/rengine/pull/1107
  • Add source for nmap scan by @psyray in https://github.com/yogeshojha/rengine/pull/1108
  • Spelling mistake in hackerone.html by @Linuxinet in https://github.com/yogeshojha/rengine/pull/1112
  • fix(version): incorrect number in art by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1111
  • Fix report generation when Ignore Informational Vulnerabilities checked by @psyray in https://github.com/yogeshojha/rengine/pull/1100
  • fix(tool_arsenal): incorrect regex version numbers by @AnonymousWP in https://github.com/yogeshojha/rengine/pull/1086

🏷️ 2.0.1

Release Date: October 24, 2023

2.0.1 fixes a ton of issues in reNgine 2.0.

Fixes: 1. Prevent duplicating Nuclei vulns for subdomain #1012 @psyray 2. Fixes for empty subdomain returned during nuclei scan #1011 @psyray 3. Add all the missing slug in scanEngine view & other places #1005 @psyray 4. Foxes for missing vulscan script #1004 @psyray 5. Fixes for missing slug in report settings saving #1003 6. Fixes for Nmap Parsing Error #1001 #1002 @psyray 7. Fix nmap script ports iterable args #1000 @psyray 8. Iterate over hostnames when multiple #1002 @psyray 8. Gau install #998, change gauplus to gau @psyray 9. Add missing slug parameter in schedule scan #996 @psyray 10. Add missing slug parameter in schedule scan #996, fixes #940, #937, #897, #764 @psyray 11. Add stack trace into make logs if DEBUG True #994 @psyray 12. Fix dirfuzz base64 name display #993 #992 @psyray 13. Fix target subdomains list not loading #991 @psyray 14. Change WORDLIST constant value #987, fixes #986@psyray 15. fix(notification_settings): submitting results in error 502 #981 fixes #970 @psyray 16. Fixes with documentation and installation/update/uninstall scripts @anonymousWP 17. Fix file directory popup not showing in detailed scan #912 @psyray

🏷️ 2.0.0

Release Date: Sept 30, 2023

Added

  • Projects: Projects allow you to efficiently organize their web application reconnaissance efforts. With this feature, you can create distinct project spaces, each tailored to a specific purpose, such as personal bug bounty hunting, client engagements, or any other specialized recon task.
  • Roles and Permissions: assign distinct roles to your team members: Sys Admin, Penetration Tester, and Auditor—each with precisely defined permissions to tailor their access and actions within the reNgine ecosystem.
  • GPT-powered Report Generation: With the power of OpenAI's GPT, reNgine now provides you with detailed vulnerability descriptions, remediation strategies, and impact assessments.
  • API Vault: This feature allows you to organize your API keys such as OpenAI or Netlas API keys.
  • GPT-powered Attack Surface Generation
  • URL gathering now is much more efficient, removing duplicate endpoints based on similar HTTP Responses, having the same content_lenth, or page_title. Custom duplicate fields can also be set from the scan engine configuration.
  • URL Path filtering while initiating scan: For instance, if we want to scan only endpoints starting with https://example.com/start/, we can pass the /start as a path filter while starting the scan. @ocervell
  • Expanding Target Concept: reNgine 2.0 now accepts IPs, URLS, etc as targets. (#678, #658) Excellent work by @ocervell
  • A ton of refactoring on reNgine's core to improve scan efficiency. Massive kudos to @ocervell
  • Created a custom celery workflow to be able to run several tasks in parallel that are not dependent on each other, such OSINT task and subdomain discovery will run in parallel, and directory and file fuzzing, vulnerability scan, screenshot gathering etc. will run in parallel after port scan or url fetching is completed. This will increase the efficiency of scans and instead of having one long flow of tasks, they can run independently on their own. @ocervell
  • Refactored all tasks to run asynchronously @ocervell
  • Added a stream_command that allows to read the output of a command live: this means the UI is updated with results while the command runs and does not have to wait until the task completes. Excellent work by @ocervell
  • Pwndb is now replaced by h8mail. @ocervell
  • Group Scan Results: reNgine 2.0 allows to group of subdomains based on similar page titles and HTTP status, and also vulnerability grouping based on the same vulnerability title and severity.
  • Added Support for Nmap: reNgine 2.0 allows to run Nmap scripts and vuln scans on ports found by Naabu. @ocervell
  • Added support for Shared Scan Variables in Scan Engine Configuration:
    • enable_http_crawl: (true/false) You can disable it to be more stealthy or focus on something different than HTTP
    • timeout: set timeout for all tasks
    • rate_limit: set rate limit for all tasks
    • retries: set retries for all tasks
    • custom_header: set the custom header for all tasks
  • Added Dalfox for XSS Vulnerability Scan
  • Added CRLFuzz for CRLF Vulnerability Scan
  • Added S3Scanner for scanning misconfigured S3 buckets
  • Improve OSINT Dork results, now detects admin panels, login pages and dashboards
  • Added Custom Dorks
  • Improved UI for vulnerability results, clicking on each vulnerability will open up a sidebar with vulnerability details.
  • Added HTTP Request and Response in vulnerability Results
  • Under Admin Settings, added an option to allow add/remove/deactivate additional users
  • Added Option to Preview Scan Report instead of forcing to download
  • Added Katana for crawling and spidering URLs
  • Added Netlas for Whois and subdomain gathering
  • Added TLSX for subdomain gathering
  • Added CTFR for subdomain gathering
  • Added historical IP in whois section
  • Added Pagination on Large datatables such as subdomains, endpoints, vulnerabilities etc #949 @psyray

Fixes

  • GF patterns do not run on 404 endpoints (#574 closed)
  • Fixes for retrieving whois data (#693 closed)
  • Related/Associated Domains in Whois section is now fixed
  • Fixed missing lightbox css & js on target screenshot page #947 #948 @psyray
  • Issue in Port-scan: int object is not subscriptable Fixed #939, #938 @AnonymousWP

Removed

  • Removed pwndb and tor related to it.
  • Removed tor for pwndb

🏷️ 1.3.6

Release Date: March 2, 2023

  • Fixed installation errors. Fixed #824, #823, #816, #809, #803, #801, #798, #797, #794, #791 .

🏷️ 1.3.5

Release Date: December 29, 2022

  • Fixed #769, #768, #766, #761, Thanks to, @bin-maker, @carsonchan12345, @paweloque, @opabravo

🏷️ 1.3.4

Release Date: November 16, 2022

  • Fixed #748 , #743 , #738, #739

🏷️ 1.3.3

Release Date: October 9, 2022

  • Fixed #723, Upgraded Go to 1.18.2

🏷️ 1.3.2

Release Date: August 20, 2022

  • Fixed #683 For Filtering GF tags
  • Fixed #669 Where Directory UI had to be collapsed

🏷️ 1.3.1

Release Date: August 12, 2022

  • Fix for #643 Downloading issue for Subdomain and Endpoints
  • Fix for #627 Too many Targets causes issues while loading datatable
  • Fix version Numbering issue

🏷️ 1.3.0

Release Date: July 19, 2022

  • Added Geographic Distribution of Assets Map
  • Fixed WHOIS Provider Changed
  • Fixed Dark UI Issues
  • Fixed HTTPX Issue

🏷️ 1.2.0

Release Date: May 27, 2022

Added

  • Naabu Exclude CDN Port Scanning
  • Added WAF Detection

Fixes

  • Fix #630 Character Name too Long Issue
  • [Security] Fixed several instances of Command Injections, CVE-2022-28995, CVE-2022-1813
  • Hakrawler Fixed - #623
  • Fixed XSS on Hackerone report via Markdown
  • Fixed XSS on Import Target using malicious filename
  • Stop Scan Fixed #561
  • Fix installation issue due to missing curl
  • Updated docker-compose version

🏷️ 1.1

Release Date: Apr 24, 2022

  • Redeigned UI
  • Added Subscan Feature

    Subscan allows further scanning any subdomains. Assume from a normal recon process you identified a subdomain that you wish to do port scan. Earlier, you had to add that subdomain as a target. Now you can just select the subdomain and initiate subscan.

  • Ability to Download reconnaissance or vulnerability report

  • Added option to customize report, customization includes the look and feel of report, executive summary etc.

  • Add IP Address from IP

  • WHOIS Addition on Detail Scan and fetch whois automatically on Adding Single Targets
  • Universal Search Box
  • Addition of Quick Add menus
  • Added ToolBox Feature

    ToolBox will feature most commonly used recon tools. One can use these tools to identify whois, CMSDetection etc without adding targets. Currently, Whois, CMSDetector and CVE ID lookup is supported. More tools to follow up.

  • Notify New Releases on reNgine if available

  • Tools Arsenal Section to feature preinstalled and custom tools
  • Ability to Update preinstalled tools from Tools Arsenal Section
  • Ability to download/add custom tools
  • Added option for Custom Header on Scan Engine
  • Added CVE_ID, CWE_ID, CVSS Score, CVSS Metrics on Vulnerability Section, this also includes lookup using cve_id, cwe_id, cvss_score etc
  • Added curl command and references on Vulnerability Section
  • Added Columns Filtering Option on Subdomain, Vulnerability and Endpoints Tables
  • Added Error Handling for Failed Scans, reason for failure scan will be displayed
  • Added Related Domains using WHOIS
  • Added Related TLDs
  • Added HTTP Status Breakdown Widget
  • Added CMS Detector
  • Updated Visualization
  • Option to Download Selected Subdomains
  • Added additional Nuclei Templates from https://github.com/geeknik/the-nuclei-templates
  • Added SSRF check from Nagli Nuclei Template
  • Added option to fetch CVE_ID details
  • Added option to Delete Multiple Scans
  • Added ffuf as Directory and Files fuzzer
  • Added widgets such as Most vulnerable Targets, Most Common Vulnerabilities, Most Common CVE IDs, Most Common CWE IDs, Most Common Vulnerability Tags

🏷️ 1.0.1

Release Date: Aug 29, 2021

Changelog

  • Fixed #482 Endpoints and Vulnerability Datatable were showing results of other targets due to the scan_id parameter
  • Fixed #479 where the scan was failing due to recent httpx release, change was in the JSON output
  • Fixed #476 where users were unable to click on Clocked Scan (Reported only on Firefox)
  • Fixed #442 where an extra slash was added in Directory URLs
  • Fixed #337 where users were unable to link custom wordlist
  • Fixed #436 Checkbox in Notification Settings were not working due to same name attribute, now fixed
  • Fixed #439 Hakrawler crashed if the deep mode was activated due to -plain flag
  • Fixed #437 If Out of Scope subdomains were supplied, the scan was failing due to None value
  • Fixed #424 Multiple Targets couldn't be scanned

Improvements

  • Enhanced install script, check for if docker is running service or not #468

Security

🏷️ 1.0

Release Date: Aug 15, 2021

After several months of work, I am excited to announce reNgine 1.0. In a nutshell, 1.0, is feature-packed with a lot of exciting features that are sure to ease your recon game.

You may watch the trailer here

  • Introducing Dark Mode, a feature you all have been asking for, is finally here.
  • Recon Data visualization

    Recon Data visualization is the representation of recon data like subdomain, ips, endpoints, ports, vulnerabilities etc into the visual format like Trees and Charts.

  • Improved correlation among recon data

    A considerable amount of effort has been spent on making sure that the correlation between recon data is consistent. With this improved correlation, you will now be able to identify recon data like, how many of the subdomains uses X as technology, how many of the subdomains use X.X.X.X as IP, etc. This also means that you will be able to see the number of vulnerabilities that a subdomain has, right from the subdomain table.

  • Ability to identify Interesting Subdomains.

    reNgine uses certain keywords like admin, cpanel, ftp, dashboard to find what is interesting for you. Users will also be able to add their own keywords and choose conditions like, "A subdomain in an interesting subdomain if it matches this keyword but also HTTP status is 200". This allows you to identify what's the most important subdomains to attack against and super useful if you have a very large number of subdomains.

  • Ability to Automatically report Vulnerabilities to Hackerone with customizable vulnerability report.

    I am excited about the possibilities of Hackerone api, this feature allows you to automatically report the vulnerability to HackerOne if a Critical or High vulnerability is found. Stay ahead of the game! What's exciting is that you also have an option to edit the vulnerability report. To prevent spamming triagers, I've made sure that only Critical and High vulnerabilities are reported. While you will still have an option to manually report the rest of the vulnerabilities.

  • Introducing OSINT Capabilities

    OSINT is one of the most required features in any recon engine, and beginning 1.0, reNgine comes with OSINT capabilities. This includes support for Dorking, Employees, Emails, Leaked Passwords, etc to be searched.

  • Recon Todo

    A good recon engine also requires a Todo feature, the idea is that you will be able to recon, add your recon todo or notes right inside reNgine. You will have an option to add todo for your Scan History, for your particular subdomain, or just a TODO! Anything is supported. You can also prioritize by making the Todo important.

  • Proxy Support

    Proxies are an integral part of any web scraping. Every website has a limit to the certain number of requests for a certain period of time from a particular IP Address that it will allow, exceeding the limit will block incoming requests from such IP Address for a specific period of time. And this is especially true for Dorking and other OSINT reNgine does. After certain Dorking attempts Google is likely to ban your IP for a certain period of time. So using a proxy was a must. Introducing proxy support for reNgine, you will have an option to add hundreds of proxies, and reNgine will pick one of them randomly during the scan.

  • GF support

    GF is an awesome tool for pattern matching in URLs! A lot of fellow hackers wanted GF support in reNgine. We now bring GF support with an option to upload your own custom GF template.

  • Screenshot Gallery with Filters

    This probably was the most requested feature in reNgine. A recon engine is incomplete without a screenshot gallery. I am also excited to let you know that, the screenshot gallery also comes with filters, you will have an option to add filters like HTTP status, IP Address, Port, Services, and Technology. And, filters will also come with an autosuggestion feature.

  • Powerful recon data filtering with auto-suggestions

    Recon data filtering was one of the most important features in reNgine, recon data is huge, and we do not want you to get lost, or spend a lot of time looking for the right recon data. So, presenting you, recon data filtering with autosuggestions. You will now be able to see a search bar in Subdomains Table, URLs, Vulnerabilities Table which will auto-suggest the col names. You can combine multiple queries using &, |, etc.

    Example

    gf_patterns=lfi&http_status=200&content_length>0

    The possibilities are endless...

  • Recon Data changes, finds new/removed subdomains/endpoints

    reNgine will now compare your last two scans to find out the recon data changes. You will have an option to send the changes to your notification channels as well. Super helpful while doing continuous monitoring on a target. Inside the scan dashboard, you will now see a separate section for Recon Data changes, which will identify any added or removed subdomains or endpoints.

  • Tagging of targets into Organization

    There are times when you wish to perform a scan for all the targets that belong to an organization. reNgine 1.0 allows you to tag multiple targets to an organization and initiate or schedule scans with one click.

  • Support for custom GF patterns and Nuclei Templates

    While nuclei was a part of the earlier release, but there wasn't any easy way to upload your custom nuclei templates. Now, you will have an option to add your custom GF or Nuclei templates right from the UI. You will also have an option to view the template.

  • Support for editing tool-related configuration files (Nuclei, Subfinder, Naabu, amass)

    Tools like Nuclei, Subfinder uses configuration files to pass API keys and certain tool-related settings. We now bring an option to directly edit tool-related configuration files right from reNgine UI. This means you will also be able to view them.

  • Option to Mark Subdomains as important

    This is a tiny little feature that will allow you to mark any subdomain as important! Watch out for a star icon on the subdomains table, you'll be able to mark them as important.

  • Separate tab for Directory scan results

    It is true that directory scan results were breaking the subdomains table, from a UX perspective, it was not a really good idea to show everything in the subdomains table. So, a new tab has been added just for directory scan results.

  • Option to Import and Export Subdomains and export endpoints

    Interoperability is something every recon tool needs, and reNgine is no different. You will now be able to import subdomains from your private recon tools to any scan before you initiate. You will see this option to import the subdomain just after you choose the scan engine. In the same section, you will also see an option to exclude subdomains.

    We also now allow you to download subdomains, or just download subdomains marked as important, or just download subdomains that are interesting. This also applies to endpoints, you can download all endpoints, just download any endpoints that have certain GF patterns matched.

  • Clean your scan results and screenshots

    I understand most of you run reNgine on your VPS, and it is very understandable that you wish to clean scan results, screenshots to save up some space. reNgine now allows you to clean up your scan data and/or screenshots.

  • Enhanced and Customizable Scan alert with support for Slack, Discord & Telegram, also send recon data directly to Discord

    Notification in the earlier version of reNgine was not very efficient, and support was only for slack. reNgine 1.0 comes with support for Slack, Discord, and Telegram. You will also have an option to customize what kind of notification to be sent, only want vulnerability-related notifications? You can choose that, only want subdomains changes? You can choose them as well. You also have an option to upload these scan data directly to your discord.

  • You can view the complete changelog here: https://github.com/yogeshojha/rengine/blob/master/CHANGELOG.md

There are a lot more tiny improvements that I worked on for several months that are sure to give you a better experience, and let you stay ahead in the recon game! I really appreciate any feedback and suggestions.

🏷️ 0.5.3

Release Date: Feb 25 2021

  • Build error for Naabu v2 Fixed
  • Added rate support for Naabu

🏷️ 0.5.2

Release Date: Feb 23 2021

  • Fixed XSS https://github.com/yogeshojha/rengine/issues/347

🏷️ 0.5.1

Release Date: Feb 19 2021

Features

  • Added Discord Support for Notification Web hooks

🏷️ 0.5

Release Date: 29 Nov 2020

  • Nuclei Integration: v0.5 is primarily focused on vulnerability scanner using Nuclei. This was a long pending due and we've finally integrated it.

  • Powerful search queries across endpoints, subdomains and vulnerability scan results: reNgine reconnaissance data can now be queried using operators like <,>,&,| and !, namely greater than, less than, and, or, and not. This is extremely useful in querying the recon data. More details can be found at Instructions to perform Queries on Recon data

  • Out of scope options: Many of you have been asking for out of scope option. Thanks to Valerio Brussani for his pull request which made it possible for out of scope options. Please check the documentation on how to define out of scope options.

  • Official Documentation(WIP): We often get asked on how to use reNgine. For long, we had no official documentation. Finally, I've worked on it and we have the official documentation at rengine.wiki

    The documentation is divided into two parts, for Developers and for Penetration Testers. For developers, it's a work in progress. I will keep you all updated throughout the process.

  • Redefined Dashboard: We've also made some changes in the Dashboard. The additions include vulnerability scan results, most vulnerable targets, most common vulnerabilities.

  • Global Search: This feature has been one of the most requested features for reNgine. Now you can search all the subdomains, endpoints, and vulnerabilities.

  • OneForAll Support: reNgine now supports OneForAll for subdomain discovery, it is currently in beta. I am working on how to integrate OneForAll APIKeys and Configuration files.

  • Configuration Support for subfinder: You will now have ability to add configurations for subfinder as well.

  • Timeout option for aquatone: We added timeout options in yaml configuration as a lot of screenshots were missing. You can now define timeout for http, scan and screenshots for timeout in milliseconds.

  • Design Changes A lot of design changes has happened in reNgine. Some of which are:

  • Endpoints Results and Vulnerability Scan Results are now displayed as a separate page, this is to separate the results and decrease the page load time.

  • Checkbox next to Subdomains and Vulnerability report list to change the status, this allows you to mark all subdomains and vulnerabilities that you've already completed working on.
  • Sometimes due to timeout, aquatone was skipping the screenshots and due to that, navigations between screenshots was little annoying. We have fixed it as well.
  • Ability to delete multiple targets and initiate multiple scans.
  • Subdomain Takeover (Removed): As we decided to use Nuclei for Vulnerability Scanner, and also, since Subjack wasn't giving enough results, I decided to remove Subjack. The subdomain Takeover will now be part of Nuclei Vulnerability Scanner.

🏷️ 0.4

Release Date: 2020-10-08

Features

  • Background tasks migrated to Celery and redis
  • Periodic and clocked scan added
  • Ability to Stop and delete the scan
  • CNAME and IP address added on detail scan
  • Content type added on Endpoints section
  • Ability to initiate multiple scans at a time

🏷️ 0.3

Release Date: 2020-07-21

Features

  • YAML based Customization Engine
  • Ability to add wordlists
  • Login Feature

🏷️ 0.2

Release Date: 2020-07-11

Features

  • Directory Search Enabled
  • Fetch URLS using hakrawler
  • Subdomain takeover using Subjack
  • Add Bulk urls
  • Delete Scan functionality

Fix

  • Windows Installation issue fixed
  • Scrollbar Issue on small screens fixed

🏷️ 0.1

Release Date: 2020-07-08

reNgine is released