The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.
☆193Nov 26, 2024Updated last year
Alternatives and similar repositories for Genzai
Users that are interested in Genzai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Mar 7, 2024Updated 2 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Apr 13, 2024Updated 2 years ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆66Nov 12, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆172Jun 25, 2021Updated 4 years ago
- SpringbootGuiExploit漏洞利用工具测试版☆20Jun 7, 2024Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 5 months ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆253Mar 28, 2024Updated 2 years ago
- ☆82Apr 9, 2024Updated 2 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆183Apr 5, 2024Updated 2 years ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆276Jun 16, 2024Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153May 7, 2024Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Sep 23, 2025Updated 7 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- ☆205Jun 11, 2024Updated last year
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆100Apr 2, 2025Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Apr 15, 2026Updated 3 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆630Jun 25, 2024Updated last year
- Linux Incident Response Reporting☆83Mar 31, 2026Updated last month
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆121Feb 7, 2024Updated 2 years ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆454Mar 31, 2026Updated last month
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- XXST-白加黑辅助挖掘工具,全程静默运行不影响正常使用☆17Apr 12, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆570Mar 28, 2024Updated 2 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆527Feb 27, 2026Updated 2 months ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated last month
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year