The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.
☆194Nov 26, 2024Updated last year
Alternatives and similar repositories for Genzai
Users that are interested in Genzai are comparing it to the libraries listed below
Sorting:
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated last year
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Nov 12, 2025Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Apr 13, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆245Mar 28, 2024Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆120Feb 7, 2024Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155May 7, 2024Updated last year
- ☆184Jun 11, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆172Jun 25, 2021Updated 4 years ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 5 months ago
- Tool to remotely dump secrets from the Windows registry☆521Updated this week
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 3 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Apr 5, 2024Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 2 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆127Nov 15, 2025Updated 3 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆450Sep 29, 2023Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆51Feb 22, 2024Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- ☆125Mar 23, 2025Updated 11 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago