Releases: yogeshojha/rengine
Releases · yogeshojha/rengine
reNgine 2.0.1
2.0.1 fixes a ton of issues in reNgine 2.0.
Fixes:
- Prevent duplicating Nuclei vulns for subdomain #1012 @psyray
- Fixes for empty subdomain returned during nuclei scan #1011 @psyray
- Add all the missing slug in scanEngine view & other places #1005 @psyray
- Foxes for missing vulscan script #1004 @psyray
- Fixes for missing slug in report settings saving #1003
- Fixes for Nmap Parsing Error #1001 #1002 @psyray
- Fix nmap script ports iterable args #1000 @psyray
- Iterate over hostnames when multiple #1002 @psyray
- Gau install #998, change gauplus to gau @psyray
- Add missing slug parameter in schedule scan #996 @psyray
- Add missing slug parameter in schedule scan #996, fixes #940, #937, #897, #764 @psyray
- Add stack trace into make logs if DEBUG True #994 @psyray
- Fix dirfuzz base64 name display #993 #992 @psyray
- Fix target subdomains list not loading #991 @psyray
- Change WORDLIST constant value #987, fixes #986@psyray
- fix(notification_settings): submitting results in error 502 #981 fixes #970 @psyray
- Fixes with documentation and installation/update/uninstall scripts @AnonymousWP
- Fix file directory popup not showing in detailed scan #912 @psyray
@AnonymousWP and @psyray have been phenomenal in fixing these bugs. Thanks to both of you! ❤️ 🚀
reNgine 2.0.0
Added
- Projects: Projects allow you to efficiently organize their web application reconnaissance efforts. With this feature, you can create distinct project spaces, each tailored to a specific purpose, such as personal bug bounty hunting, client engagements, or any other specialized recon task.
- Roles and Permissions: assign distinct roles to your team members: Sys Admin, Penetration Tester, and Auditor—each with precisely defined permissions to tailor their access and actions within the reNgine ecosystem.
- GPT-powered Report Generation: With the power of OpenAI's GPT, reNgine now provides you with detailed vulnerability descriptions, remediation strategies, and impact assessments.
- API Vault: This feature allows you to organize your API keys such as OpenAI or Netlas API keys.
- GPT-powered Attack Surface Generation
- URL gathering now is much more efficient, removing duplicate endpoints based on similar HTTP Responses, having the same content_lenth, or page_title. Custom duplicate fields can also be set from the scan engine configuration.
- URL Path filtering while initiating scan: For instance, if we want to scan only endpoints starting with https://example.com/start/, we can pass the /start as a path filter while starting the scan. @ocervell
- Expanding Target Concept: reNgine 2.0 now accepts IPs, URLS, etc as targets. (#678, #658) Excellent work by @ocervell
- A ton of refactoring on reNgine's core to improve scan efficiency. Massive kudos to @ocervell
- Created a custom celery workflow to be able to run several tasks in parallel that are not dependent on each other, such OSINT task and subdomain discovery will run in parallel, and directory and file fuzzing, vulnerability scan, screenshot gathering etc. will run in parallel after port scan or url fetching is completed. This will increase the efficiency of scans and instead of having one long flow of tasks, they can run independently on their own. @ocervell
- Refactored all tasks to run asynchronously @ocervell
- Added a stream_command that allows to read the output of a command live: this means the UI is updated with results while the command runs and does not have to wait until the task completes. Excellent work by @ocervell
- Pwndb is now replaced by h8mail. @ocervell
- Group Scan Results: reNgine 2.0 allows to group of subdomains based on similar page titles and HTTP status, and also vulnerability grouping based on the same vulnerability title and severity.
- Added Support for Nmap: reNgine 2.0 allows to run Nmap scripts and vuln scans on ports found by Naabu. @ocervell
- Added support for Shared Scan Variables in Scan Engine Configuration:
enable_http_crawl
: (true/false) You can disable it to be more stealthy or focus on something different than HTTPtimeout
: set timeout for all tasksrate_limit
: set rate limit for all tasksretries
: set retries for all taskscustom_header
: set the custom header for all tasks
- Added Dalfox for XSS Vulnerability Scan
- Added CRLFuzz for CRLF Vulnerability Scan
- Added S3Scanner for scanning misconfigured S3 buckets
- Improve OSINT Dork results, now detects admin panels, login pages and dashboards
- Added Custom Dorks
- Improved UI for vulnerability results, clicking on each vulnerability will open up a sidebar with vulnerability details.
- Added HTTP Request and Response in vulnerability Results
- Under Admin Settings, added an option to allow add/remove/deactivate additional users
- Added Option to Preview Scan Report instead of forcing to download
- Added Katana for crawling and spidering URLs
- Added Netlas for Whois and subdomain gathering
- Added TLSX for subdomain gathering
- Added CTFR for subdomain gathering
- Added historical IP in whois section
Fixes
- GF patterns do not run on 404 endpoints (#574 closed)
- Fixes for retrieving whois data (#693 closed)
- Related/Associated Domains in Whois section is now fixed
Removed
- Removed pwndb and tor related to it.
- Removed tor for pwndb
reNgine 1.3.6
Fixed Various Installation Errors
Fixed Naabu Port Scanning Issue
reNgine 1.3.5
- Fixed various installation issues
- Fixed #769, #768, #766, #761, Thanks to, @bin-maker, @carsonchan12345, @paweloque, @opabravo
Release 1.3.4 HTTPX FIxed
reNgine 1.3.3
Fix #732, Upgraded Go to 1.1.8.2
reNgine 1.3.2
reNgine 1.3.1
reNgine 1.3.0
1.3.0
Release Date: July 11, 2022
Added
- Geographic Distribution of Assets Map
- Added WAF Detector as an optional tool in Scan Engine
Fixes
- WHOIS Provider Changed
- Fixed Dark UI Issues
- Fix HTTPX Issue with custom Header
reNgine 1.2.0
1.2.0
Release Date: May 30, 2022
Added
- Naabu Exclude CDN Port Scanning
- Added WAF Detection
Fixes
- Fix #630 Character Name too Long Issue
- [Security] Fixed several instances of Command Injections, CVE-2022-28995, CVE-2022-1813
- Hakrawler Fixed - #623
- Fixed XSS on Hackerone report via Markdown
- Fixed XSS on Import Target using malicious filename
- Stop Scan Fixed #561
- Fix installation issue due to missing curl
- Updated docker-compose version