reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information.
☆17Jul 11, 2020Updated 5 years ago
Alternatives and similar repositories for rengine
Users that are interested in rengine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 15, 2023Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 5 years ago
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 5 years ago
- ☆18Nov 18, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Sep 30, 2020Updated 5 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- My presentations home page☆10Jul 29, 2022Updated 3 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- Learning material for completely newcomers in the field of BOFs☆16Apr 11, 2020Updated 5 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- ☆72Sep 18, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- ☆23Mar 4, 2025Updated last year
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- A collection of simple tools and poc-builders☆39Mar 17, 2026Updated 3 weeks ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Useful scripts for tampermonkey that I used during bug hunting. Will be updated "au fil de l'eau"☆17Jun 2, 2025Updated 10 months ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some anti QEMU trick used by in-the-wild malware.☆14Aug 14, 2015Updated 10 years ago
- Pysh: the python shell☆20Nov 15, 2016Updated 9 years ago
- AWS Penetration Testing, published by Packt☆33Jan 18, 2023Updated 3 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- Official Python client library for the Invoiced API☆12Jun 22, 2024Updated last year
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- w3m config files☆16Oct 10, 2010Updated 15 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A third-party Gopher Assassin for the Havoc Framework.☆45Jan 1, 2024Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Some quines in the Go programming language☆15Mar 8, 2023Updated 3 years ago
- Scan tool for iSH app☆14Aug 14, 2021Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year