You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. OpenVAS scanner - The Open Source variant of the premium scanner Nessus from Tenable (very powerful into identify vulns).
2. Nikto scanner
3. All vulnerability scanners: Option to have/save different scan options per URL/Endpoint/Asset Example: Use Nuclei to scan 1 Endpoint only with specific templeate. So: Choose Scanner > Select Templeate (or command) > Select URL (Endpoint) > Scan.
4. Rengine > Scan History: Filter by what is already scanned / not scanned (subdomains)
5. Option to download as .txt: IPs, Ports, Technologies.
6. Vulnerabilities: Option to select 1 vulnerability and "Mark as resolved OR reported"
And filter Vulnerabilities by All, Resolved and Reported- time saving
The Vulnerability menu should be rebuilt from scratch. It is the most cluttered menu, it has a table that does not fit on a full laptop screen (vertical scroll), you cannot change Status etc.
Add click to copy CURL command. Now curl command is displayed on 4-8 lines (the display does not have enough space). And some commands don't work in the terminal after you copy them because of copying > paste.
You through your actions have given and are giving the opportunity to some hard working people to have jobs they otherwise might not have had.
Respect & Thank you for everything!
The text was updated successfully, but these errors were encountered:
👋 Hi @Adelante10k,
Issues is only for reporting a bug/feature request. Please read documentation before raising an issue https://rengine.wiki
For very limited support, questions, and discussions, please join reNgine Discord channel: https://discord.gg/azv6fzhNCE
Please include all the requested and relevant information when opening a bug report. Improper reports will be closed without any response.
1. OpenVAS scanner - The Open Source variant of the premium scanner Nessus from Tenable (very powerful into identify vulns).
2. Nikto scanner
3. All vulnerability scanners: Option to have/save different scan options per URL/Endpoint/Asset
Example: Use Nuclei to scan 1 Endpoint only with specific templeate.
So: Choose Scanner > Select Templeate (or command) > Select URL (Endpoint) > Scan.
4. Rengine > Scan History: Filter by what is already scanned / not scanned (subdomains)
5. Option to download as .txt: IPs, Ports, Technologies.
6. Vulnerabilities: Option to select 1 vulnerability and "Mark as resolved OR reported"
And filter Vulnerabilities by All, Resolved and Reported - time saving
The Vulnerability menu should be rebuilt from scratch. It is the most cluttered menu, it has a table that does not fit on a full laptop screen (vertical scroll), you cannot change Status etc.
Add click to copy CURL command. Now curl command is displayed on 4-8 lines (the display does not have enough space). And some commands don't work in the terminal after you copy them because of copying > paste.
You through your actions have given and are giving the opportunity to some hard working people to have jobs they otherwise might not have had.
Respect & Thank you for everything!
The text was updated successfully, but these errors were encountered: