Skip to content

Commit

Permalink
Update CHANGELOG file
Browse files Browse the repository at this point in the history
  • Loading branch information
pablosnt committed Aug 19, 2022
1 parent 1281887 commit 2afd376
Show file tree
Hide file tree
Showing 2 changed files with 11 additions and 15 deletions.
22 changes: 8 additions & 14 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,23 +3,17 @@ All notable changes to this project will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/), and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [Unreleased]
## [1.0.0] - 2022-08-19

### Added

- `Projects` management
- `Targets` management
- `Tasks` management
- `Executions` management
- `Findings` management
- `Tools` management
- `Processes` management
- `Wordlists` management
- `Users` management
- Execution of `hacking tools`
- Execution of `pentesting processes` combining different hacking tools automatically
- Execution of `scheduled tasks`
- Search of projects and processes by `tags`
- `Like` features for tools, processes and wordlists
- `Execution` of tools and processess
- `Defect-Dojo integration` to import findings from Rekono
- `User notifications` by email or Telegram depending on preferences
- Executions and targets management from `Telegram Bot`
- Initial `frontend`
- `User notifications` by email and Telegram
- Management of `Projects`, `Targets`, `Wordlist` and `Users`
- Execution of tools and processes from `Telegram Bot`
- Initial `web UI`
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,12 +61,14 @@
Thanks to all the contributors of these amazing tools!


## Why?
## Why Rekono?

Do you ever think about the steps that you follow when start a pentesting? Probably you start performing some OSINT tasks to gather public information about the target. Then, maybe you run hosts discovery and ports enumeration tools. When you know what the target exposes, you can execute more specific tools for each service, to get more information and maybe, some vulnerabilities. And finally, if you find the needed information, you will look for a public exploit to get you into the target machine. I know, I know, this is an utopic scenario, and in the most cases the vulnerabilities are found due to the pentester skills and not by scanning tools. But before using your skills, how many time do you spend trying to get as information as possible with hacking tools? Probably, too much.

Why not automate this process and focus on find vulnerabilities using your skills and the information that Rekono sends you?

> The `Rekono` name comes from the Esperanto language where it means __recon__.

## Installation

Expand Down

0 comments on commit 2afd376

Please sign in to comment.