GitHub / ivre / ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
JSON API: https://data.code.gouv.fr/api/v1/hosts/GitHub/repositories/ivre%2Fivre
étoiles: 3 691
forks: 652
issues ouvertes: 53
licence: gpl-3.0
langage: Python
taille: 28,9 Mo
dépendances analysées: En attente
date de création: il y a plus de 10 ans
date de mise à jour: il y a 6 jours
enregistré: il y a 15 jours
dernière synchronisation: il y a 5 jours
Commit Stats
Commits: 2837
Authors: 51
Mean commits per author: 55.63
Development Distribution Score: 0.451
More commit stats: https://commits.ecosystem.code.gouv.fr/hosts/GitHub/repositories/ivre/ivre
Sujets: bro, easm, external-attack-surface-management, hacktoberfest, masscan, network, network-discovery, network-recon, network-reconnaissance, network-security, nmap, nmap-parser, nmap-results-analyse, nmap-scripts, osint, projectdiscovery, scan-ports, scans, security, zeek
Funding Links https://github.com/sponsors/p-l-