All Projects → cea-sec → Ivre

cea-sec / Ivre

Licence: gpl-3.0
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects
javascript
184084 projects - #8 most used programming language
Zeek
47 projects
CSS
56736 projects
lua
6591 projects

Projects that are alternatives of or similar to Ivre

ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+16.34%)
Mutual labels:  osint, bro, nmap, network-monitoring, scan-ports, scans, network-discovery, network-analysis, network-security, zeek, masscan, nmap-parser, nmap-scripts, nmap-results-analyse, osint-python, osint-reconnaissance
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-98.37%)
Mutual labels:  bro, network-monitoring, network-analysis, network-security, zeek
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+197.38%)
Mutual labels:  network, network-analysis, network-security, network-discovery
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (-9.31%)
Mutual labels:  hacktoberfest, osint, osint-python
network-tools
Network Tools
Stars: ✭ 27 (-98.84%)
Mutual labels:  network-monitoring, network-analysis, network-security
Osint tips
OSINT
Stars: ✭ 322 (-86.19%)
Mutual labels:  osint, network, nmap
zeek-docs
Documentation for Zeek
Stars: ✭ 41 (-98.24%)
Mutual labels:  bro, network-monitoring, zeek
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-82.28%)
Mutual labels:  network, network-analysis, nmap
Cocoadebug
iOS Debugging Tool 🚀
Stars: ✭ 3,769 (+61.69%)
Mutual labels:  network, network-analysis, network-monitoring
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+169.58%)
Mutual labels:  osint, network-security, osint-reconnaissance
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (-73.32%)
Mutual labels:  network-analysis, network-monitoring, network-security
Zxrequestblock
基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-93.14%)
Mutual labels:  network, network-monitoring, network-security
mailcat
Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬
Stars: ✭ 219 (-90.6%)
Mutual labels:  osint, osint-python, osint-reconnaissance
SaltwaterTaffy
An nmap wrapper library for .NET
Stars: ✭ 44 (-98.11%)
Mutual labels:  nmap, network-discovery, network-security
Nload
Real-time network traffic monitor
Stars: ✭ 121 (-94.81%)
Mutual labels:  network, network-analysis, network-monitoring
Zeek
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Stars: ✭ 4,180 (+79.32%)
Mutual labels:  network-monitoring, bro, zeek
cherrymap
Import Nmap scans to Cherrytree
Stars: ✭ 37 (-98.41%)
Mutual labels:  nmap, nmap-parser, nmap-results-analyse
Batfish
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (-74.6%)
Mutual labels:  network, network-analysis, network-security
Bmon
bandwidth monitor and rate estimator
Stars: ✭ 787 (-66.24%)
Mutual labels:  network, network-analysis, network-monitoring
React Native Network Logger
An HTTP network request monitor for React Native with in-app interface for iOS and Android with no native code
Stars: ✭ 161 (-93.09%)
Mutual labels:  hacktoberfest, network, network-monitoring

MongoDB tests Elasticsearch tests PostgreSQL tests TinyDB tests SQLite tests Maxmind tests Linting tests Documentation Status Codacy Badge Join the chat at Gitter Follow on Twitter

IVRE

Logo IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks) is a network recon framework, including tools for passive recon (flow analytics relying on Zeek, Argus, Nfdump, and active recon (IVRE uses Nmap to run scans; IVRE can also import XML output from Nmap and Masscan), and JSON output from ZGrab2 and ZDNS.

The advertising slogans are:

  • (in French): IVRE, il scanne Internet.
  • (in English): Know the networks, get DRUNK!
  • (in Latin): Nunc est bibendum.

The names IVRE and DRUNK have been chosen as a tribute to "Le Taullier".

Overview

You can have a look at the project homepage, the screenshot gallery, and the quick video introduction for an overview of the Web interface.

We have a demonstration instance, just contact us to get an access.

A few blog posts have been written to show some features of IVRE.

Documentation

IVRE's documentation is hosted by Read The Docs, based on files from the doc/ directory of the repository.

On an IVRE web server, the doc/* files are available, rendered, under /doc/.

On a system with IVRE installed, you can use a --help option with most IVRE CLI tools, and help(ivre.module) with most IVRE Python sub-modules.

License

IVRE is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

IVRE is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with IVRE. If not, see the gnu.org web site.

Support

Try --help for the CLI tools, help() under Python and the "HELP" button in the web interface.

Have a look at the FAQ!

Feel free to contact the author and offer him a beer if you need help!

If you don't like beer, a good scotch or any other good alcoholic beverage will do (it is the author's unalienable right to decide whether a beverage is good or not).

Contributing

Code contributions (pull-requests) are of course welcome!

The project needs scan results and capture files that can be provided as examples. If you can contribute some samples, or if you want to contribute some samples and would need some help to do so, or if you can provide a server to run scans, please contact the author.

Contact

For both support and contribution, the repository on Github should be used: feel free to create a new issue or a pull request!

You can also join the Gitter conversation (that is the preferred way to get in touch for questions), or use the e-mail dev on the domain ivre.rocks.

Talking about IVRE

Research

If you are using IVRE in you research, please cite it as follows:

IVRE contributors. IVRE, a network recon framework. https://github.com/ivre/ivre, 2011-2021.

Here is the appropriate bibtex entry:

@MISC{ivre,
    title = {{IVRE}, a network recon framework},
    author={IVRE contributors},
    url = {https://ivre.rocks/},
    howpublished = {\url{https://github.com/ivre/ivre/}},
    institution = {{ANSSI}: the National Cybersecurity Agency of France and
                   {CEA}: the French Alternative Energies and Atomic Energy Commission},
    year = {2011--2021},
}

Technical documents & blog posts

You can mention "IVRE, a network recon framework", together with the project homepage, https://ivre.rocks/ and/or the repository, https://github.com/ivre/ivre.

On twitter, you can follow and/or mention @IvreRocks.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].