TasosY2K / camera-exploit-tool
Automated exploit scanner for cameras on the internet
☆184Updated 11 months ago
Alternatives and similar repositories for camera-exploit-tool:
Users that are interested in camera-exploit-tool are comparing it to the libraries listed below
- Redirect All Traffic Through Tor Network For Kali Linux☆178Updated 2 weeks ago
- Bypass 403☆126Updated 2 weeks ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆279Updated 8 months ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆117Updated 3 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆224Updated 5 months ago
- Search & Parse Password Leaks☆329Updated 5 months ago
- Remote persistent 🔑Logger for Windows and Linux☆299Updated last year
- IoT Camera Reconnaissance and Live Viewer☆139Updated 7 months ago
- Shodan Dorks 2023☆232Updated last month
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆131Updated 5 months ago
- The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using s…☆262Updated last week
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆142Updated 9 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 4 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆164Updated 8 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆53Updated 6 months ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆113Updated 2 years ago
- Google dorking tool☆217Updated 5 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- 🕵️ OSINT Tool (github tracker)☆135Updated 9 months ago
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆56Updated 11 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆101Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆239Updated 5 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- An OSINT Framework project based on Python☆105Updated 8 months ago
- ☆140Updated last year
- Osint tool for track ip adress☆205Updated last year
- 🕵️ Email osint tool☆62Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆74Updated 5 months ago