ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
About ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.
What you should know about ivre
ivre — Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, collect and analyse network intelligence from your sensors, and much more! Uses Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, etc.. It is categorized under Security and primarily built with Python. The project has gathered 4,009 stars and 686 forks on GitHub, indicating a healthy and active community.
Pricing & licensing: This tool is offered free of charge , released under the GPL-3.0 license. The source code is openly available on GitHub, allowing engineers to audit, contribute, or fork as needed.
Use cases & topics: ivre is associated with the following topics: bro, easm, external-attack-surface-management, hacktoberfest, masscan, network, network-discovery, network-recon. Teams working in bro / easm / external-attack-surface-management spaces typically evaluate this kind of tool when scoping new architecture decisions or replacing legacy components.
Getting started: Check out the official GitHub repository for installation steps, configuration examples, and the latest release notes. Most teams hit value within the first week if the tool aligns with their existing Security stack.
Editor's note from Fanny Engriana (Founder, Wardigi Digital Agency): when evaluating tools in the Security category for our agency clients, we look at three things first — license clarity, community size, and active maintenance. Tools with explicit license terms and ongoing commits tend to remain viable across multi-year projects.