Nmap Development mailing list archives
A Python framework for network recon
From: Pierre LALET <pierre () droids-corp org>
Date: Sat, 13 Sep 2014 12:09:57 +0200
Hi list, I would like to introduce to you a Python open-source framework for network recon called IVRE. IVRE can be used both for active and passive recon. For active recon, it uses Nmap and stores the scan results in a MongoDB database that can be queried using: - CLI tools - a Python API - a Web interface to filter & It has been tested with millions of hosts in the database and seems to work fine. BTW, if some of you have scan results they can share, I'd be happy to use them in a tutorial. IVRE should be rather easy to install, and has its own Docker images (see <https://github.com/cea-sec/ivre/blob/master/doc/DOCKER.md> on how to use them) to make it easier. Any feedback is welcome! Refs: - Announcement: <https://twitter.com/pi3rre/status/510440233763344384> - Github: <https://github.com/cea-sec/ivre> - Tutorial: <http://pierre.droids-corp.org/blog/html/2014/09/12/_active__network_recon_with_ivre.html> _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- A Python framework for network recon Pierre LALET (Sep 13)