reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface.
☆160Mar 18, 2026Updated this week
Alternatives and similar repositories for rengine-ng
Users that are interested in rengine-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆24Feb 23, 2026Updated last month
- Jumpstart multiple WebSocket servers quickly☆32Nov 23, 2021Updated 4 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- ☆14Sep 1, 2024Updated last year
- ☆15Jun 27, 2024Updated last year
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 8 months ago
- Ollama Automated Security Intelligence Scanner☆232Aug 20, 2025Updated 7 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- 🎉 CVE Monitor v1.0☆26Jun 30, 2025Updated 8 months ago
- ☆14Oct 14, 2022Updated 3 years ago
- SkillArch☆45Updated this week
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- AI-powered assistant that integrates seamlessly with Caido☆65Feb 20, 2026Updated last month
- ☆26Mar 11, 2025Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- A delicious, but malicious SSL-VPN server 🌮☆263Feb 27, 2026Updated 3 weeks ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆212Mar 7, 2026Updated 2 weeks ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- 通过分离的方式免杀火绒☆12Dec 15, 2023Updated 2 years ago
- Lab used for workshop and CTF☆508Feb 3, 2026Updated last month
- Speedy probe-based UDP service scanner☆135Oct 21, 2025Updated 5 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆62Feb 25, 2025Updated last year
- Containers Wrapper is a Go library that provides a convenient and unified interface for interacting with container engines such as Docker…☆13Sep 10, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆474Jan 15, 2026Updated 2 months ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Our Tips&Tricks☆148Mar 4, 2026Updated 2 weeks ago
- A GitHub Actions Supply Chain CTF / Goat☆26Jan 6, 2026Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆47Apr 7, 2025Updated 11 months ago
- Some tips for Bug Bounty using LibreOffice☆57Feb 28, 2025Updated last year