reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface.
☆162Mar 27, 2026Updated 2 weeks ago
Alternatives and similar repositories for rengine-ng
Users that are interested in rengine-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simulator forked from ICSim used during Car Hacking Workshops☆20Aug 30, 2024Updated last year
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆23Feb 23, 2026Updated last month
- ☆126Dec 7, 2024Updated last year
- Jumpstart multiple WebSocket servers quickly☆33Nov 23, 2021Updated 4 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆14Sep 1, 2024Updated last year
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- ☆15Jun 27, 2024Updated last year
- Ollama Automated Security Intelligence Scanner☆234Aug 20, 2025Updated 7 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 4 months ago
- 🎉 CVE Monitor v1.0☆27Jun 30, 2025Updated 9 months ago
- ☆14Oct 14, 2022Updated 3 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- SkillArch☆53Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- ☆26Mar 11, 2025Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- AI-powered assistant that integrates seamlessly with Caido☆75Feb 20, 2026Updated last month
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆216Mar 7, 2026Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆267Feb 27, 2026Updated last month
- An AI-powered assistant for hackers and security professionals built for Caido☆33Jan 24, 2026Updated 2 months ago
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- Lab used for workshop and CTF☆510Feb 3, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Payload Generation Workflow☆41Jul 18, 2025Updated 8 months ago
- External C2 is a specification to allow third-party programs to act as a communication layer for Cobalt Strike’s Beacon payload.☆16Jul 17, 2025Updated 8 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆484Jan 15, 2026Updated 2 months ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Our Tips&Tricks☆149Mar 4, 2026Updated last month