ENNAENNA

IVRE

GPL-3.0

🌐 Network Recon · Python

IVRE (Instrument de Veille sur les Réseaux Extérieurs) is a self-hosted network reconnaissance framework that functions as a private Shodan/Censys alternative. It integrates three data collection approaches: active scanning (wrapping Nmap, Masscan, and ZGrab2), passive network traffic analysis (using Zeek/Bro, p0f, and Argus), and flow analysis. All data is stored in MongoDB and searchable through a web interface, Python API, or CLI. IVRE enables organizations to build and maintain their own internet-wide scan datasets, correlate active and passive intelligence, and track infrastructure changes over time.

4.0kstars
686forks
53issues
Updated today
+I use this

Installation

$ pip install ivre

Use Cases

  • Building a private internet-wide scan database
  • Correlating active scanning with passive traffic analysis
  • Asset discovery and change tracking over time
  • Replacing external services like Shodan with self-hosted infrastructure

Tags

network-reconshodan-alternativepassive-analysisself-hostedasset-discoverybroeasmexternal-attack-surface-managementhacktoberfestmasscannetworknetwork-discoverynetwork-reconnaissancenetwork-securitynmapnmap-parsernmap-results-analysenmap-scriptsosintprojectdiscoveryscan-portsscanssecurityzeek

Community Reviews

More in Network Recon