Rex Scan - Penetration Testing Toolkit
A comprehensive automated network reconnaissance and vulnerability scanner designed for penetration testers and security professionals.
Problem & Solution
The Problem
Penetration testers often juggle multiple tools (nmap, searchsploit, gobuster, dnsenum) and manually correlate findings across different outputs. This fragmented workflow is time-consuming, error-prone, and makes it difficult to maintain comprehensive documentation of security assessments. Additionally, vulnerability correlation with CVEs and exploit databases requires significant manual effort.
The Solution
REX SCAN orchestrates the entire pentesting workflow into a single automated pipeline. It intelligently coordinates industry-standard tools, automatically correlates findings with NIST NVD CVE database, matches exploits via searchsploit, and generates comprehensive reports in multiple formats. The dual-tool architecture with Python fallbacks ensures reliability even when external tools aren't available, while command transparency provides complete audit trails for compliance and reproducibility.
Technologies Used
Core Framework
Security Tools
APIs & Data
Key Achievements
Automated CVE Correlation
Engineered real-time vulnerability correlation with NIST NVD API, automatically matching detected services and versions to known CVEs with CVSS v3.1/v2.0 scoring, significantly reducing manual research time.
Dual-Tool Architecture
Designed an intelligent fallback system with Python implementations for critical modules (DNS, directory enumeration), ensuring core functionality works even when external tools aren't available while maintaining performance when they are.
Comprehensive Reporting
Built multi-format reporting system (Text, JSON, HTML) with interactive dashboards featuring charts, visualizations, and complete command transparency—every external command logged with full output for reproducibility and compliance.
Scan Resumption & State Management
Implemented robust state management allowing scans to be interrupted and resumed without data loss, crucial for long-running assessments against large networks or during rate-limited scanning.
Flexible Scan Profiles
Developed pre-configured scan profiles (stealth, balanced, aggressive, quick, full) optimized for different scenarios, from IDS evasion to comprehensive full-port assessments, with custom profile support.
Screenshots
Command Line Interface
Vulnerability Detection
CVE Correlation
Enumeration Results
Real-time Progress
Interactive Report