GitHub / ivre / ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
JSON API: https://data.code.gouv.fr/api/v1/hosts/GitHub/repositories/ivre%2Fivre
Stars: 3,691
Forks: 652
Open issues: 53
License: gpl-3.0
Language: Python
Size: 28.9 MB
Dependencies parsed at: Pending
Created at: over 10 years ago
Updated at: 7 days ago
Pushed at: 16 days ago
Last synced at: 7 days ago
Commit Stats
Commits: 2837
Authors: 51
Mean commits per author: 55.63
Development Distribution Score: 0.451
More commit stats: https://commits.ecosystem.code.gouv.fr/hosts/GitHub/repositories/ivre/ivre
Topics: bro, easm, external-attack-surface-management, hacktoberfest, masscan, network, network-discovery, network-recon, network-reconnaissance, network-security, nmap, nmap-parser, nmap-results-analyse, nmap-scripts, osint, projectdiscovery, scan-ports, scans, security, zeek
Funding Links https://github.com/sponsors/p-l-