DeadNumbers / hikka-x86Links
IP camera bruteforcer, 32 bit version
☆14Updated 9 years ago
Alternatives and similar repositories for hikka-x86
Users that are interested in hikka-x86 are comparing it to the libraries listed below
Sorting:
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆38Updated 6 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)☆15Updated 8 months ago
- CCTV Camera scanner using the GoAhead webserver exploit☆18Updated 8 months ago
- like hacking, this is a brutefore for DVR - camara HIKVision☆16Updated 8 years ago
- This is the ToRat client, a part of the ToRat Project.☆25Updated 6 years ago
- 3WiFi Locator for Android☆17Updated 6 years ago
- ☆16Updated 7 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Updated 6 years ago
- A tool for recover router password☆33Updated 7 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Updated 4 years ago
- port scanner & login credential tester☆15Updated 6 years ago
- ☆70Updated 7 years ago
- pentest toolbox☆27Updated 3 years ago
- Hikvision IP-cam Bruteforce☆31Updated 2 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆111Updated 7 years ago
- TCP tunnel over RTP/SIP☆96Updated 5 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Updated 8 years ago
- :.IP webcam penetration test suit.:☆24Updated 6 years ago
- An0n 3xPloiTeR Shell☆35Updated 6 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆26Updated 6 years ago
- All xxx-arsenal repos in one☆17Updated 7 years ago
- wh cyberspace☆12Updated 3 years ago
- Hack tools coded in golang☆23Updated 2 years ago
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Updated 7 years ago
- ☆25Updated 5 years ago
- DEScrypt CPU Collision Cracker☆51Updated 6 years ago