Back to Portfolio

Rex Scan - Penetration Testing Toolkit

Cybersecurity View on GitHub

A comprehensive automated network reconnaissance and vulnerability scanner designed for penetration testers and security professionals.

Problem & Solution

The Problem

Penetration testers often juggle multiple tools (nmap, searchsploit, gobuster, dnsenum) and manually correlate findings across different outputs. This fragmented workflow is time-consuming, error-prone, and makes it difficult to maintain comprehensive documentation of security assessments. Additionally, vulnerability correlation with CVEs and exploit databases requires significant manual effort.

The Solution

REX SCAN orchestrates the entire pentesting workflow into a single automated pipeline. It intelligently coordinates industry-standard tools, automatically correlates findings with NIST NVD CVE database, matches exploits via searchsploit, and generates comprehensive reports in multiple formats. The dual-tool architecture with Python fallbacks ensures reliability even when external tools aren't available, while command transparency provides complete audit trails for compliance and reproducibility.

Technologies Used

Core Framework

Python 3.8+ dnspython requests Jinja2

Security Tools

nmap searchsploit gobuster dnsenum

APIs & Data

NIST NVD API Cloudflare DoH matplotlib

Key Achievements

Automated CVE Correlation

Engineered real-time vulnerability correlation with NIST NVD API, automatically matching detected services and versions to known CVEs with CVSS v3.1/v2.0 scoring, significantly reducing manual research time.

Dual-Tool Architecture

Designed an intelligent fallback system with Python implementations for critical modules (DNS, directory enumeration), ensuring core functionality works even when external tools aren't available while maintaining performance when they are.

Comprehensive Reporting

Built multi-format reporting system (Text, JSON, HTML) with interactive dashboards featuring charts, visualizations, and complete command transparency—every external command logged with full output for reproducibility and compliance.

Scan Resumption & State Management

Implemented robust state management allowing scans to be interrupted and resumed without data loss, crucial for long-running assessments against large networks or during rate-limited scanning.

Flexible Scan Profiles

Developed pre-configured scan profiles (stealth, balanced, aggressive, quick, full) optimized for different scenarios, from IDS evasion to comprehensive full-port assessments, with custom profile support.

Screenshots

Rex Scan CLI

Command Line Interface

Scan Results

Vulnerability Detection

Report Generation

CVE Correlation

Module Output

Enumeration Results

Progress Tracking

Real-time Progress

Report Dashboard

Interactive Report