IVRE

150 posts

IVRE banner
IVRE

IVRE

@IvreRocks

Open-source #network recon framework. Relies on @nmap, Masscan, @zeekurity, @pdiscoveryio, p0f, …. #OSINT #redteam #blueteam #bugbounty @[email protected]

Beigetreten Ocak 2016
400 Folgt1.3K Follower
IVRE
IVRE@IvreRocks·
🎉 New feature in IVRE: 🌐 RIR (regional Internet registry) lookup. >_ CLI & 🐍 Python only for now, still a bit experimental 🚧. Download and locally query data from RIR (think "local whois for IP addresses, that you can reverse query"). Get the dev version from Github or Docker
IVRE tweet mediaIVRE tweet mediaIVRE tweet media
English
0
4
7
587
IVRE retweetet
bearstech
bearstech@bearstech·
🎄 Jour 5 du Calendrier de l'Avent des 🐻 IVRE : un framework Open Source pour la reconnaissance réseau. Il s'appuie sur des outils reconnus (Nmap, Masscan, ZGrab2, ZDNS et Zeek) pour collecter des données, les stocke dans une base de données et fournit des outils pour les analyser.
GIF
Français
3
22
80
6K
IVRE retweetet
Nicolas Krassas
Nicolas Krassas@Dinosn·
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool github.com/ivre/ivre
English
2
92
311
19.9K
IVRE retweetet
Robert Graham
Robert Graham@robertgraham·
Current status: I've made a ton of changes to masscan's --banners option, and integrated a bunch of changes from others, primarily @ivrerocks. I'd be interested in any bug reports if you want to test them out.
Robert Graham tweet media
English
1
4
18
3.2K
IVRE
IVRE@IvreRocks·
Amen to that!
English
0
0
2
525
IVRE
IVRE@IvreRocks·
@snovvcrash Hey! Thanks for the kind words! However please note that some of the patches included in the fork won't be useful unless you import the results in IVRE, as it is the intent of this repository.
English
0
0
1
463
sn🥶vvcr💥sh
sn🥶vvcr💥sh@snovvcrash·
(1/2) FYI, #masscan users. The original masscan does NOT include the ‘TCP options’ field with MSS value which is required for some hosts to reply to the packet. The fork by @IvreRocks features the --tcpmss switch that includes the mentioned field for your better scope coverage ⤵️
sn🥶vvcr💥sh tweet mediasn🥶vvcr💥sh tweet mediasn🥶vvcr💥sh tweet media
English
4
42
111
21.6K
IVRE retweetet
Google Open Source
Google Open Source@GoogleOSS·
🥳 We're pleased to announce the first group of winners for the 2023 Google Open Source Peer Bonus Program! This cycle received a record-breaking 255 nominations. Huge congratulations to the 203 winners. See the winners → goo.gle/45vnbZ6
Google Open Source tweet media
English
3
34
117
49.7K
IVRE retweetet
Kaon Thana
Kaon Thana@kaonthana·
HackerNews: "Researchers uncover new BGP flaw in popular routing software" One way to help prevent these kind of denial-of-service exploits is to make sure your perimeter is secure to trusted sources. I built a tool to perform such perimeter scanning here kaonbytes.com/p/perimeter-sc…
English
0
10
22
2.5K
IVRE retweetet
Alex Ellis
Alex Ellis@alexellisuk·
Is Docker saying that the OSS openfaas organisation on Docker Hub will get deleted if we don't sign up for a paid plan? What about Prometheus, and all the other numerous OSS orgs on the Docker Hub? cc @justincormack
Alex Ellis tweet media
English
48
158
460
152.2K
IVRE
IVRE@IvreRocks·
IVRE v0.9.19 has just been released! See below for the main changes
IVRE tweet mediaIVRE tweet media
English
0
4
11
1.4K
IVRE
IVRE@IvreRocks·
@nullt3r @nullenc0de I ingest output from other tools, including httpx, tldx & nuclei.
English
1
0
0
0
Paul Seekamp
Paul Seekamp@nullenc0de·
I have to make about ~5 billion http requests. What's the fastest way to do that? Looking for easier solutions than Axiom.
English
26
6
76
0
IVRE
IVRE@IvreRocks·
@nullenc0de @nullt3r For non-TLS HTTP requests, Masscan will do that within the SYN scan when using --banners
English
0
0
0
0
Paul Seekamp
Paul Seekamp@nullenc0de·
@nullt3r How did you do it? Just throw tons of computing at it?
English
3
0
0
0
nullt3r
nullt3r@nullt3r·
@nullenc0de I used Masscan to scan for open ports and httpx (projectdiscovery) to do the dirty work (get TLS info, headers, body etc.). After that I used clickhouse for result analysis (I could directly import the JSONL from httpx) - about 10 GB of data. 10 servers.
English
1
1
8
0
IVRE retweetet
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
Due to recent events, some Kali Linux tool creators now have Mastodon accounts @epi@infosec.exchange (@epi052) @ivre@infosec.exchange (@IvreRocks) @seemoo@infosec.exchange (@seemoolab) @r00t0v3rr1d3@infosec.exchange (@r00t0v3rr1d3) @droe@infosec.exchange (@droethlisberger) ⬇️🧵
Cyber Detective💙💛@cyb_detective

Today I started collecting a list of accounts from developers and small teams who have created tools added to the official version of #Kali Linux: twitter.com/i/lists/152769… Subscribe to it to stay on the cutting edge of #cybersecurity. 🧵🧵🧵

English
1
9
22
0