IVRE
Tool and Usage
Project details
- License
- GPLv3
- Programming language
- Python
- Authors
- Camille Mougey
- Florent Monjalet
- Pierre Lalet
- Latest release
- 0.9.21
- Latest release date
Project health
How it works
IVRE uses data from other sources like Argus, Bro, Masscan, Nmap, zmap, and others. It pulls in the data and stores it in a MongoDB instance for further analysis. Network flows (flowdata) can be used as well, in which it uses a Neo4j database. The data can be extracted and displayed via command-line, web interface, or the Python API.
Background information
IVRE means Instrument de veille sur les réseaux extérieurs. It is French for DRUNK, Dynamic Recon of Unknown NetworKs. The IVRE framework allows both active as passive data gathering.
Usage and audience
IVRE is commonly used for digital forensics, information gathering, intrusion detection, or network analysis. Target users for this tool are pentesters, security professionals, and system administrators.
Features
- Application programming interface (API) available
- Command line interface
- Graphical user interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + More than 10 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Installation
Supported operating systems
IVRE is known to work on Linux.
Dependencies
Several dependencies are required to use IVRE.
- MongoDB
- bottle
- future
- psycopg2
- py2neo
- pycrypto
- pymongo
- sqlalchemy
IVRE alternatives
Similar tools to IVRE:
0trace.py
The 0trace.py utility is a rewrite of 0trace (by another author) to perform reconnaissance and bypass network firewalls.
Zeek
Zeek is a network security monitoring tool (NSM) and helps with monitoring. It can also play an active rol in performing forensics and incident response.
Chiron
Chiron is a security assessment framework for IPv6 testing. It can be used during penetration testing or analysis of network devices. Read how it works in this review.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a network reconnaissance tools and network security monitoring tool.