.d8888b.           888                                       d8b 
d88P  Y88b          888                                       Y8P 
888    888          888
888         .d88b.  888888 .d88b.  88888b.   8888b.  888  888 888 
888        d88""88b 888   d88""88b 888 "88b     "88b 'Y8bd8P' 888 
888    888 888  888 888   888  888 888  888 .d888888   X88K   888 
Y88b  d88P Y88..88P Y88b. Y88..88P 888 d88P 888  888 .d8""8b. 888 
 "Y8888P"   "Y88P"   "Y888 "Y88P"  88888P"  "Y888888 888  888 888 

License: GPL v2 GitHub top language PyPI - Python Version LGTM Grade Lines of code Code style: black GitHub search hit counter GitHub release (latest by date) GitHub issues PyPI - Downloads

<!---![GitHub all releases](https://img.shields.io/github/downloads/Samsung/cotopaxi/total)--->

Black Hat Arsenal Black Hat Arsenal DEF CON 27 Black Hat Arsenal DEF CON 28 Black Hat Arsenal Black Hat Arsenal

Set of tools for security testing of Internet of Things devices using protocols: AMQP, CoAP, DTLS, HTCPCP, HTTP, HTTP/2, gRPC, KNX, mDNS, MQTT, MQTT-SN, QUIC, RTSP, SSDP.


Cotopaxi uses GNU General Public License, version 2: https://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html


Cotopaxi toolkit is intended to be used only for authorized security testing!

Some tools (especially vulnerability tester and protocol fuzzer) can cause some devices or servers to stop acting in the intended way -- for example leading to crash or hang of tested entities or flooding with network traffic another entities.

Make sure you have permission from the owners of tested devices or servers before running these tools!

Make sure you check with your local laws before running these tools!


To install minimal Cotopaxi version (without Machine Learning and development tools):

pip install cotopaxi

Almost complete installation (without scapy-ssl_tls required for DTLS support):

pip install cotopaxi[all]

For more detailed documentation about installation see: Installation Guide

Integration with Metasploit

If you want to use Cotopaxi tools from Metasploit see: Metasploit integration


Machine learning classificator used in the device_identification tool was trained using corpus "IMC 2019 payload dataset" provided by authors of the following paper:

Title: Information Exposure for Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach Authors: Jingjing Ren, Daniel J. Dubois, David Choffnes, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi Venue: Internet Measurement Conference (IMC) 2019 URL: https://moniotrlab.ccis.neu.edu/imc19dataset/

We would like to thank above listed authors for sharing this corpus!

Tools in this package:

Protocols supported by different tools (left box describes working implementation in Python 2 and right one for Python 3):


For more detailed documentation of each tool see: Tools

Supported vulnerabilites

Vulnerabilities identified by Cotopaxi team, that can be tested using Cotopaxi:

Other vulnerabilities supported by Cotopaxi:

New vulnerabilities can be easily added to the database in vulnerabilities.yaml and payloads in cotopaxi/vulnerabilities/<protocol>/<payload.raw>.

Known issues / limitations

There are some known issues or limitations caused by using scapy as network library:

See more at: https://scapy.readthedocs.io/en/latest/troubleshooting.html#


For more detailed information about development of Cotopaxi see: Development guide