reNgine is An automated reconnaissance framework for web applications with focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by database and simple yet intuitive User Interface. reNgine makes easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless. This presentation will be a complete walkthrough on reNgine 1.0, a game-changing recon tool. Features: Perform Recon: Subdomain Discovery, Ports Discovery, Endpoints Discovery, Directory Bruteforce, Screenshot gathering IP Discovery, CNAME discovery, Vulnerability scan using Nuclei Ability to Automatically report Vulnerabilities to Hackerone Recon Visualization Highly configurable scan engines OSINT Capabilities (Metainfo Gathering, Employees Gathering, Email Address with leaked passwords, dorks) Customizable Notification for Slack, Discord and Telegram Perform Advanced Query lookup using natural language alike and, or, not operations Support for Recon Notes and Todos Support for Clocked & Periodic Scans Proxy Support Screenshot Gallery with Filters Powerful recon data filtering with auto suggestions Recon Data changes, finds new/removed subdomains/endpoints Support for tagging targets to Organization Ability to identify Interesting Subdomains Support for custom GF & Nuclei Templates Interoperable with other tools, Import/Export Subdomains/Endpoints Tool: https://github.com/yogeshojha/rengine Trailer: https://www.youtube.com/watch?v=_jBf_9qEG3U