Welcome to IoTSploit
Welcome to IoTSploit Documentation
Section titled “Welcome to IoTSploit Documentation”IoTSploit is a powerful IoT security testing toolkit providing protocol analysis, vulnerability scanning, fuzzing, and more. Through our documentation, learn about the latest IoT security threats and protection methods.
Quick Navigation
Section titled “Quick Navigation”- File Obfuscator Manual - Complete guide to hiding files in images using steganography and encryption
- Attack Path Analysis Tutorial - Configure LLM, pick entry points and an asset, then generate a TARA table with AI
Features
Section titled “Features”🔒 Security Testing Tools
Section titled “🔒 Security Testing Tools”- Protocol Analyzer
- Vulnerability Scanner
- Fuzzer
🛠️ Toolkit
Section titled “🛠️ Toolkit”- File Obfuscator (Steganography + Encryption)
- More tools coming soon…