Smithery Logo
MCPsSkillsDocsPricing
Login
Smithery Logo

Accelerating the Agent Economy

Resources

DocumentationPrivacy PolicySystem Status

Company

PricingAboutBlog

Connect

© 2026 Smithery. All rights reserved.

    BrownFineSecurity

    onvifscan

    BrownFineSecurity/onvifscan
    Security
    554
    10 installs

    About

    SKILL.md

    Install

    Install via Skills CLI

    or add to your agent
    • Claude Code
      Claude Code
    • Codex
      Codex
    • OpenClaw
      OpenClaw
    • Cursor
      Cursor
    • Amp
      Amp
    • GitHub Copilot
      GitHub Copilot
    • Gemini CLI
      Gemini CLI
    • Kilo Code
      Kilo Code
    • Junie
      Junie
    • Replit
      Replit
    • Windsurf
      Windsurf
    • Cline
      Cline
    • Continue
      Continue
    • OpenCode
      OpenCode
    • OpenHands
      OpenHands
    • Roo Code
      Roo Code
    • Augment
      Augment
    • Goose
      Goose
    • Trae
      Trae
    • Zencoder
      Zencoder
    • Antigravity
      Antigravity
    ├─
    ├─
    └─

    About

    ONVIF device security scanner for testing authentication and brute-forcing credentials. Use when you need to assess security of IP cameras or ONVIF-enabled devices.

    SKILL.md

    Onvifscan - ONVIF Security Scanner

    You are helping the user scan ONVIF devices for security issues including authentication bypasses and weak credentials using the onvifscan tool.

    Tool Overview

    Onvifscan is an ONVIF device security scanner that can:

    • Test for unauthenticated access to ONVIF endpoints
    • Perform credential brute-forcing attacks

    Instructions

    When the user asks to scan ONVIF devices, test IP cameras, or assess IoT device security:

    1. Determine scan type:

      • auth: Authentication and access control testing (recommended to start)
      • brute: Credential brute-forcing on password-protected endpoints
    2. Get target information:

      • Ask for the device URL/IP
      • Determine which scan type to run
      • Check if they have custom wordlists
    3. Execute the scan:

      • Use the onvifscan command from the iothackbot bin directory
      • Format: onvifscan <subcommand> <url> [options]

    Subcommands

    Auth Scan

    Tests ONVIF endpoints for authentication requirements:

    onvifscan auth http://192.168.1.100
    

    Options:

    • -v, --verbose: Show full XML responses
    • -a, --all: Test ALL endpoints including potentially destructive ones
    • --format text|json|quiet: Output format

    Brute Force

    Attempts credential brute-forcing on protected endpoints:

    onvifscan brute http://192.168.1.100
    

    Options:

    • --usernames <file>: Custom usernames wordlist (default: built-in onvif-usernames.txt)
    • --passwords <file>: Custom passwords wordlist (default: built-in onvif-passwords.txt)
    • --format text|json|quiet: Output format

    Examples

    Quick auth check on a device:

    onvifscan auth 192.168.1.100
    

    Auth check with verbose output:

    onvifscan auth http://192.168.1.100:8080 -v
    

    Brute force with custom wordlists:

    onvifscan brute 192.168.1.100 --usernames custom-users.txt --passwords custom-pass.txt
    

    Important Notes

    • URLs can omit http:// - it will be added automatically
    • Auth scan is non-destructive and safe to run
    • Use -a flag with caution - may test destructive endpoints
    • Brute force is rate-limited to prevent device overload (max 20 attempts by default)
    • Built-in wordlists located in wordlists/ directory
    Recommended Servers
    Infisical
    Infisical
    WorkOS
    WorkOS
    Agent Safe Message MCP
    Agent Safe Message MCP
    Repository
    brownfinesecurity/iothackbot
    Files