K3ysTr0K3R / CVE-2017-7921-EXPLOIT
A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.
☆20Updated last year
Alternatives and similar repositories for CVE-2017-7921-EXPLOIT:
Users that are interested in CVE-2017-7921-EXPLOIT are comparing it to the libraries listed below
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆18Updated 3 years ago
- Hikvision Backdoor using Shodan. Python file that scans IP's from Shodan.☆17Updated last year
- IP range distributed scanner for vulnerable Hikvision cameras☆22Updated 5 years ago
- Hikvision IP-cam Bruteforce☆19Updated last year
- Exploit tool for Hikvision IP Camera.☆11Updated 4 years ago
- Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.☆138Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated last year
- Python script to perform phishing attacks through captive portals, made for learning purposes☆46Updated 2 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆13Updated last year
- HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8.☆113Updated 3 years ago
- Kali Packerge Manager☆56Updated last year
- Brute Force Hikvision Devices that only allow PIN passwords☆18Updated 4 months ago
- Generate wordlists for dictionary attacks☆25Updated 10 months ago
- Hacking tools. IP fortune, webmap -- web vulns scanner, rtsp brute+fuzz, and more.☆37Updated 3 years ago
- simple ss7 & imsi catcher & kraken☆18Updated 2 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆29Updated last year
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆51Updated last year
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆46Updated 4 years ago
- This program shows you IMSI , TMSI, LAC, CI of cellphones around you. This program was made to understand how GSM network works. Understa…☆34Updated 2 years ago
- Network sniffing automation with Bettercap as rogue AP or as client in your network☆25Updated 2 years ago
- Automate script for wifi hacking☆14Updated 10 months ago
- Red Team scripts written in python☆18Updated 2 years ago
- Run WPS PIN attacks (Pixie Dust, online bruteforce, PIN prediction) without monitor mode with the wpa_supplicant☆79Updated 2 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆101Updated 11 months ago
- Dahua DVRs bruteforcer at port 37777☆38Updated last year
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆29Updated 3 months ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆13Updated 3 years ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆17Updated 2 years ago
- Exploit Pack contains a full set of 39.000+ exploits, you can be sure that your next pentest will become unstoppable. All operating syste…☆86Updated 3 years ago