Genzai
by umair9747
Genzai is an IoT security toolkit that identifies IoT dashboards and scans them for default passwords and known vulnerabilities.
The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.
Primary Use Case
Security researchers and penetration testers use Genzai to fingerprint IoT devices accessible over the internet, detect default credentials, and identify potential vulnerabilities based on device-specific templates. It is ideal for assessing the security posture of IoT endpoints such as routers, cameras, and home automation systems.
- Fingerprint IoT devices using HTTP response signatures across 20+ device categories
- Check for vendor-specific default passwords using a dedicated login database
- Scan for known vulnerabilities based on exposed endpoints and vulnerable versions
- Supports diverse IoT categories including routers, surveillance cameras, industrial automation, and more
- API mode for seamless integration into existing pipelines
- GUI mode for user-friendly interaction
- Regularly updated templates for fingerprints, default logins, and vulnerabilities
Installation
- Clone the repository: git clone https://github.com/umair9747/Genzai.git
- Navigate to the cloned directory: cd Genzai
- Refer to the documentation for setup and usage instructions: ./docs/documentation.md#setupnusage
Usage
>_ python genzai.py --target <target_url_or_ip>Run a scan against a specified target to fingerprint the IoT device and check for default passwords and vulnerabilities.
>_ python genzai.py --apiStart Genzai in API mode to deploy an API server for integration with other tools or pipelines.
>_ python genzai.py --guiLaunch the graphical user interface for easier interaction and scanning.
- Integrate Genzai into CI/CD pipelines for continuous IoT security posture assessment.
- Use Genzai's API mode to automate large-scale IoT device fingerprinting and vulnerability scanning.
- Combine Genzai scans with exploitation frameworks (e.g., Metasploit) for red team automated attack simulations.
- Leverage Genzai's default password detection to prioritize remediation efforts in blue team operations.
- Use Genzai in purple team exercises to validate detection capabilities and improve IoT security monitoring.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about Genzai. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools

RIOT
RIOT-OS/RIOT
RIOT - The friendly OS for IoT
awesome-iot-hacks
nebgnahz/awesome-iot-hacks
A Collection of Hacks in IoT Space so that we can address them (hopefully).
awesome-embedded-and-iot-security
fkie-cad/awesome-embedded-and-iot-security
A curated list of awesome embedded and IoT security resources.

RaspberryMatic
jens-maus/RaspberryMatic
:house: A feature-rich but lightweight, buildroot-based Linux operating system alternative for a CloudFree CCU3/ELV-Charly 'homematicIP CCU' IoT smarthome central. Running as a pure virtual appliance (ProxmoxVE, Home Assistant, LXC, Docker/OCI, Kubernetes/K8s, etc.) on a dedicated embedded device (RaspberryPi, etc.) or generic x86/ARM hardware...
CatSniffer
ElectronicCats/CatSniffer
CatSniffer is an original multiprotocol and multiband board for sniffing, communicating, and attacking IoT (Internet of Things) devices using the latest radio IoT protocols. It is a highly portable USB stick that integrates TI CC1352, Semtech SX1262, and an RP2040 for V3 or a Microchip SAMD21E17 for V2

Weather-Micropython-HackConRD2025
jrgdiaz/Weather-Micropython-HackConRD2025
CTF e introducción a desarrollo IoT con MicroPython para HackConRD2025
