CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing the negligence of people, and is used to identify weaknesses in an organization's security infrastructure.
☆47Feb 26, 2026Updated 2 months ago
Alternatives and similar repositories for camjacking
Users that are interested in camjacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 3 years ago
- A repo to store public scan data for my bug bounty hunting framework.☆23Dec 26, 2025Updated 4 months ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Complete guide on how to install macOS using OpenCore on Asus ASUS TUF F15 FX506LHB and maybe similar FX506 models☆11Feb 10, 2023Updated 3 years ago
- Enumerate typosquatting, IDN homograph, bitsquatting, and visual spoofing candidates for red team engagements, threat hunting, and brand …☆11Mar 28, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Don't use bookmarks. A collection of resources for designers and front-end developers.☆13Feb 4, 2023Updated 3 years ago
- ☆13Nov 18, 2020Updated 5 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A scanner to scan ports and extra..☆12Nov 12, 2021Updated 4 years ago
- Personal website☆20Jan 3, 2026Updated 4 months ago
- A powerful reporting tool on Facebook from different protocols☆12Sep 17, 2023Updated 2 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆16May 31, 2025Updated 11 months ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link.☆22Dec 13, 2020Updated 5 years ago
- OSINT programs using open data from the city of Los Angeles☆19Jan 26, 2020Updated 6 years ago
- ☆13Apr 10, 2022Updated 4 years ago
- IP Tracker With Google Map Link☆15Jun 16, 2022Updated 3 years ago
- List of companies that hire security people full remote.☆110Mar 7, 2026Updated 2 months ago
- Simple Calculator for termux to help with common mathematic problems☆13Nov 25, 2020Updated 5 years ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link. Author will not be responsible for any misuse of this t…☆140Jul 1, 2025Updated 10 months ago
- Job vacancies come with the need to manually go through numerous applications and CVs. We seek an effective way to short-list submitted c…☆43Feb 16, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Termux website scanner☆21Jun 21, 2021Updated 4 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- IP and geolocation tracking tool☆62Oct 3, 2024Updated last year
- Command line application to generate random usernames☆15Dec 25, 2019Updated 6 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Official payload library for the O.MG line of products from Mischief Gadgets☆10Aug 22, 2023Updated 2 years ago
- Password list generator in node js☆10May 8, 2024Updated 2 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆29Sep 4, 2025Updated 8 months ago
- All-in-One Safety Evaluation Framwork☆50Apr 21, 2026Updated 2 weeks ago
- Ethical Hacking - Useful Resources☆20Apr 17, 2026Updated 3 weeks ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆12Feb 14, 2023Updated 3 years ago
- privilege escalation by piggy-backing user sudo requests☆12Feb 6, 2023Updated 3 years ago
- This is my zsh configuration☆20Jun 26, 2025Updated 10 months ago