DeadNumbers / hikka-x86Links
IP camera bruteforcer, 32 bit version
☆14Updated 9 years ago
Alternatives and similar repositories for hikka-x86
Users that are interested in hikka-x86 are comparing it to the libraries listed below
Sorting:
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- A tool for recover router password☆30Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Hikvision IP-cam Bruteforce☆25Updated 2 years ago
- like hacking, this is a brutefore for DVR - camara HIKVision☆16Updated 7 years ago
- :.IP webcam penetration test suit.:☆23Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆25Updated 6 years ago
- Python wrapper for 3WiFi Wireless Database (https://3wifi.stascorp.com/)☆13Updated 5 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆17Updated 3 months ago
- The great patator tool compiled for Windows☆26Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Updated 12 years ago
- ☆19Updated 7 years ago
- RAT-via-Telegram☆42Updated 8 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- ☆70Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- VK bot для сноса бесед☆12Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Get clients and access points.☆49Updated 6 years ago
- An SSH honeypot written entirely in Go.☆12Updated 7 months ago
- Docker kinsing malware bitcoin/xmr miner☆23Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 7 years ago
- pentest toolbox☆28Updated 3 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Updated 7 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆19Updated 5 years ago
- TeleShadow - Telegram Desktop Session Stealer (Windows)☆116Updated 7 years ago