ENNAENNA

IVRE vs Nmap

GitHub Stats

4.0k
Stars
12.8k
686
Forks
2.8k
53
Issues
896
today
Updated
today
GPL-3.0
License
-
Python
Language
C/C++

About IVRE

IVRE (Instrument de Veille sur les Réseaux Extérieurs) is a self-hosted network reconnaissance framework that functions as a private Shodan/Censys alternative. It integrates three data collection approaches: active scanning (wrapping Nmap, Masscan, and ZGrab2), passive network traffic analysis (using Zeek/Bro, p0f, and Argus), and flow analysis. All data is stored in MongoDB and searchable through a web interface, Python API, or CLI. IVRE enables organizations to build and maintain their own internet-wide scan datasets, correlate active and passive intelligence, and track infrastructure changes over time.

About Nmap

Nmap (Network Mapper) is a free and open-source utility for network discovery and security auditing. It uses raw IP packets to determine available hosts, services, operating systems, packet filters/firewalls, and dozens of other characteristics. It was designed to rapidly scan large networks but works fine against single hosts. Nmap's scripting engine (NSE) allows users to write and share scripts to automate networking tasks, from vulnerability detection to backdoor discovery. It's used by security professionals, system administrators, and researchers worldwide.

Platform Support

🐧linux🍎macos
🐧linux🍎macos🪟windows

Tags

IVRE only

network-reconshodan-alternativepassive-analysisself-hostedasset-discovery

Nmap only

port-scanservice-detectionos-fingerprintscripting-engineclassic