Nmap Development mailing list archives

A Python framework for network recon


From: Pierre LALET <pierre () droids-corp org>
Date: Sat, 13 Sep 2014 12:09:57 +0200

Hi list,

I would like to introduce to you a Python open-source framework for
network recon called IVRE.

IVRE can be used both for active and passive recon. For active recon,
it uses Nmap and stores the scan results in a MongoDB database that
can be queried using:
  - CLI tools
  - a Python API
  - a Web interface to filter & 

It has been tested with millions of hosts in the database and seems to
work fine.

BTW, if some of you have scan results they can share, I'd be happy to
use them in a tutorial.

IVRE should be rather easy to install, and has its own Docker images
(see <https://github.com/cea-sec/ivre/blob/master/doc/DOCKER.md> on
how to use them) to make it easier.

Any feedback is welcome!

Refs:
- Announcement: <https://twitter.com/pi3rre/status/510440233763344384>
- Github: <https://github.com/cea-sec/ivre>
- Tutorial: <http://pierre.droids-corp.org/blog/html/2014/09/12/_active__network_recon_with_ivre.html>
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: