.. image:: https://readthedocs.org/projects/ansicolortags/badge/?version=latest :target: http://mqtt-pwn.readthedocs.io/?badge=latest
.. image:: https://img.shields.io/github/license/akamai-threat-research/mqtt-pwn.svg :target: https://github.com/akamai-threat-research/mqtt-pwn/blob/master/LICENSE
.. image:: https://img.shields.io/badge/python-3%2E6-green.svg :target: https://github.com/akamai-threat-research/mqtt-pwn/
.. image:: https://img.shields.io/badge/docker-friendly-blue.svg :target: https://github.com/akamai-threat-research/mqtt-pwn/
MQTT is a machine-to-machine connectivity protocol designed as an extremely lightweight publish/subscribe messaging transport and widely used by millions of IoT devices worldwide. MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations, as it combines enumeration, supportive functions and exploitation modules while packing it all within command-line-interface with an easy-to-use and extensible shell-like environment.
.. image:: https://raw.githubusercontent.com/akamai-threat-research/mqtt-pwn/master/docs/_static/images/another-logo-trans-bg-small.png :target: https://github.com/akamai-threat-research/mqtt-pwn
Daniel Abeles <https://twitter.com/Daniel_Abeles>
_Moshe Zioni <https://twitter.com/dalmoz_>
_Shodan.io
API for available vulnerable MQTT brokersDocumentation is available at https://mqtt-pwn.readthedocs.io/.