CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing the negligence of people, and is used to identify weaknesses in an organization's security infrastructure.
☆42Feb 26, 2026Updated last month
Alternatives and similar repositories for camjacking
Users that are interested in camjacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆13Apr 21, 2023Updated 2 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 6 months ago
- A repo to store public scan data for my bug bounty hunting framework.☆23Dec 26, 2025Updated 3 months ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Complete guide on how to install macOS using OpenCore on Asus ASUS TUF F15 FX506LHB and maybe similar FX506 models☆11Feb 10, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Deprecated Setup script for installing Bitcoin Core to Tails persistent storage. See github.com/BenWestgate/bails for its sucessor projec…☆11May 17, 2025Updated 10 months ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Don't use bookmarks. A collection of resources for designers and front-end developers.☆13Feb 4, 2023Updated 3 years ago
- ☆12Nov 18, 2020Updated 5 years ago
- ☆16Apr 2, 2026Updated 2 weeks ago
- Find alive hosts by scanning IP addresses☆12Jun 18, 2020Updated 5 years ago
- A library for making Discreet Log Contracts oracles in NodeJS☆16Jun 21, 2018Updated 7 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Personal website☆20Jan 3, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆16May 31, 2025Updated 10 months ago
- Grab cam shots from target's phone front camera or PC webcam just sending a link.☆22Dec 13, 2020Updated 5 years ago
- ☆13Apr 10, 2022Updated 4 years ago
- Design data, drawings, CNC program and parts list for manufacturing a Jig to secure your Seed words on stainless Steel washers☆19Sep 23, 2022Updated 3 years ago
- Research and Development into an integrated system that will allow a BTC NODE to communicate via satellite to another node.☆21Dec 2, 2025Updated 4 months ago
- IP Tracker With Google Map Link☆15Jun 16, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Sqlmap for lazy people☆20Oct 1, 2020Updated 5 years ago
- List of companies that hire security people full remote.☆110Mar 7, 2026Updated last month
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- Termux website scanner☆21Jun 21, 2021Updated 4 years ago
- checks various security features of a system, including firewall, intrusion detection system (IDS),Intrusion Prevention Systems (IPS), Ne…☆11Feb 21, 2023Updated 3 years ago
- IP and geolocation tracking tool☆62Oct 3, 2024Updated last year
- Android Dynamic Class Dumper — dump all DEX files from running Android apps using Frida☆45Mar 27, 2026Updated 2 weeks ago
- Command line application to generate random usernames☆15Dec 25, 2019Updated 6 years ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆43Apr 11, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- IP Tracking☆10Jul 1, 2019Updated 6 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- All-in-One Safety Evaluation Framwork☆47Mar 4, 2026Updated last month
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆11Feb 14, 2023Updated 3 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago