The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.
☆194Nov 26, 2024Updated last year
Alternatives and similar repositories for Genzai
Users that are interested in Genzai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Mar 7, 2024Updated 2 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Apr 13, 2024Updated last year
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Nov 12, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆172Jun 25, 2021Updated 4 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆247Mar 28, 2024Updated last year
- ☆82Apr 9, 2024Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Apr 5, 2024Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154May 7, 2024Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 6 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- ☆197Jun 11, 2024Updated last year
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux Incident Response Reporting☆83Mar 15, 2024Updated 2 years ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆627Jun 25, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆120Feb 7, 2024Updated 2 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆453Sep 29, 2023Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- ☆569Mar 28, 2024Updated last year
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated 3 weeks ago
- Reverse shell that can bypass windows defender detection☆171Feb 3, 2024Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year