Giter Club home page Giter Club logo

genzai's Introduction

Genzai

The IoT Security Toolkit

DescriptionFeaturesSetup & UsageAcknowledgementsContact Me

Buy Me A Coffee




Description

Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as an input and furthermore scan them for default password issues and potential vulnerabilities based on paths and versions.

An example would be an admin panel for a home automation device acceessible over the internet. The tool will firstly fingerprint the IoT (product) based on a set of signatures from signatures.json and then based on the product identified, and the relevant templates in its DBs (vendor-logins.json and vendor-vulns.json), scan it for vendor-specific default passwords like admin:admin as well as look for any potential vulnerabilities.

Genzai currently supports fingerprinting over 20 IoT-based dashboards and has the same amount of templates to look for default password issues across them. It currently has a total of 10 vulnerability templates which will increase with coming updates.

Features

Fingerprinting - The Wappalyzer of IoT Devices

With Genzai, you can fingerprint the IoT Product running over a target based on the HTTP response received through it. With a support of 20 templates and counting, Genzai can look for categories such as:
  • Wireless Router
  • Surveillance Camera
  • HMI or Human Machine Interface
  • Smart Power Control
  • Building Access Control System
  • Climate Control
  • Industrial Automation
  • Home Automation
  • Water Treatment System

Default Password Checks

Based on the IoT product identified and the presence of a relevant template in Vendor Logins DB, Genzai will also check if the target is still using a vendor-specific default password considering how several devices across the internet still use a default password letting anyone to log in as an administrative user.

Vulnerability Scanning

Also based on the IoT product identified and with the presence of a relevant template in Vendor Vulns DB, Genzai will check for any potential vulnerabilities across the target. While some of the templates actively flag issues based on an exposed endpoint or file, others may flag based on a vulnerable version.

Acknowledgements

Genzai has been or will be noticed at,

Let's Connect!

If you have any questions or feedback about Genzai or just want to connect with me, feel free to reach out via LinkedIn or Email.

Legal Disclaimer

Usage of Genzai for scanning or attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

genzai's People

Contributors

umair9747 avatar umair-spidersilk avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.