SkillAgentSearch skills...

Genzai

The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.

Install / Use

/learn @umair9747/Genzai

README

<h1 align="center">Genzai</h1> <p align="center"><b>The IoT Security Toolkit</b></p> <p align="center"> <a href="#description">Description</a> • <a href="#features">Features</a> • <a href="./docs/documentation.md#setupnusage">Setup & Usage</a> • <a href="#acknowledgements">Acknowledgements</a> • <a href="#contact">Contact Me</a><br> <p align="center"> <img src="https://img.shields.io/badge/Version-2.0-green"> <img src="https://img.shields.io/badge/Black%20Hat%20Arsenal-%20Asia%202024-blue"> <img src="https://img.shields.io/badge/Black%20Hat%20Arsenal-%20MEA%202024-blue"> <img src="https://img.shields.io/badge/GISEC Armory-%20Dubai%202024-blue"> <a href="https://www.buymeacoffee.com/umair9747" target="_blank"><img src="https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png" alt="Buy Me A Coffee" style="height: 21px !important;width: 94px !important;" ></a> </p> </p> <hr> <img src="./genzai.png"> <hr style="width:300px; height: 1px; margin: auto; margin-top: 20px;" /> <br> <div id="description"> <h2> Description </h2> Genzai helps you identify IoT or Internet of Things related dashboards across a single or set of targets provided as an input and furthermore scan them for default password issues and potential vulnerabilities based on paths and versions. <br></br> An example would be an admin panel for a home automation device acceessible over the internet. The tool will firstly fingerprint the IoT (product) based on a set of signatures from <a href="./signatures.json">signatures.json</a> and then based on the product identified, and the relevant templates in its DBs (<a href="./vendor-logins.json">vendor-logins.json</a> and <a href="./vendor-vulns.json">vendor-vulns.json</a>), scan it for vendor-specific default passwords like admin:admin as well as look for any potential vulnerabilities. <br><br> Genzai currently supports fingerprinting over 20 IoT-based dashboards and has the same amount of templates to look for default password issues across them. It currently has a total of 10 vulnerability templates which will increase with coming updates. </div> <hr style="height: 1px;"> <div id="features"> <h2> Features </h2> <h4>Fingerprinting - The Wappalyzer of IoT Devices</h4> With Genzai, you can fingerprint the IoT Product running over a target based on the HTTP response received through it. With a support of 20 templates and counting, Genzai can look for categories such as: <br>
  • Wireless Router
  • Surveillance Camera
  • HMI or Human Machine Interface
  • Smart Power Control
  • Building Access Control System
  • Climate Control
  • Industrial Automation
  • Home Automation
  • Water Treatment System
<h4>Default Password Checks</h4> Based on the IoT product identified and the presence of a relevant template in <a href="./vendor-logins.json">Vendor Logins DB</a>, Genzai will also check if the target is still using a vendor-specific default password considering how several devices across the internet still use a default password letting anyone to log in as an administrative user. </div> <h4>Vulnerability Scanning</h4> Also based on the IoT product identified and with the presence of a relevant template in <a href="./vendor-vulns.json">Vendor Vulns DB</a>, Genzai will check for any potential vulnerabilities across the target. While some of the templates actively flag issues based on an exposed endpoint or file, others may flag based on a vulnerable version. </div> <div id="v2"> <h2>v2 is here! 🚀</h2> In this November 2024 update prior to <a href="https://blackhatmea.com/agenda-2024">Black Hat MEA</a>, we are glad to announce the v2 update for Black Hat MEA with some really exciting new features! <h4>📡 API Mode: Integrate Seamlessly</h4> Want to supercharge your existing pipeline or application with Genzai? The all-new API mode allows you to deploy an API server effortlessly and perform scans with ease. No fuss, just results. [<a href="./docs/v2.md#apimode">Learn more</a>] <h4>🖥️ GUI Mode: Simplicity Meets Power</h4> Let’s face it—CLI is functional, but not always fun. That’s why we’ve introduced a sleek, web-based GUI mode! It’s intuitive, engaging, and designed to take your productivity to the next level. Say goodbye to monotony and hello to efficiency. [<a href="./docs/v2.md#guimode">Learn more</a>] <h4>🌐 Recon Mode: Explore at Warp Speed</h4> Curious to see if IoT devices are lurking in a subnet? Or perhaps you need to probe a private network for vulnerabilities? Recon mode has your back, offering lightning-fast scanning to uncover hidden gems (or threats). [<a href="./docs/v2.md#reconmode">Learn more</a>] </div> </div> <div id="acknowledgements"> <h2> Acknowledgements </h2> Genzai has been or will be noticed at, <ul type="disc"> <li><a href="https://www.blackhat.com/asia-24/arsenal/schedule/index.html#genzai---the-iot-security-toolkit-37373">Black Hat Asia 2024 [Arsenal]</a></li> <li><a href="https://www.gisec.ae/gisec-armory">GISEC Armory Edition 1 Dubai 2024</a></li> <li><a href="https://blackhatmea.com/agenda-2024">Black Hat MEA 2024 [Arsenal]</a></li> </ul> </div> <div id="contact"> <h2> Let's Connect! </h2> If you have any questions or feedback about Genzai or just want to connect with me, feel free to reach out via <a href="https://in.linkedin.com/in/umair-nehri-49699317a">LinkedIn</a> or <a href="mailto:umairnehri9747@gmail.com">Email</a>. </div> <h2>Legal Disclaimer</h2> Usage of Genzai for scanning or attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
View on GitHub
GitHub Stars194
CategoryDevelopment
Updated16d ago
Forks24

Languages

Go

Security Score

100/100

Audited on Mar 18, 2026

No findings