Ullaakut / cameradarLinks
Cameradar hacks its way into RTSP videosurveillance cameras
☆4,397Updated 8 months ago
Alternatives and similar repositories for cameradar
Users that are interested in cameradar are comparing it to the libraries listed below
Sorting:
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,377Updated 6 months ago
- Automated Mass Exploiter☆5,130Updated 2 years ago
- Modlishka. Reverse Proxy.☆5,007Updated 3 weeks ago
- A Workflow Engine for Offensive Security☆5,652Updated last month
- Attack Surface Management Platform☆8,813Updated 2 weeks ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,262Updated 11 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,320Updated 8 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,198Updated last week
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,127Updated 5 years ago
- Next generation web scanner☆5,927Updated 11 months ago
- Rewrite of the popular wireless network auditor, "wifite"☆7,009Updated 10 months ago
- Exploitation Framework for Embedded Devices☆12,608Updated last week
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,545Updated 7 months ago
- Common User Passwords Profiler (CUPP)☆4,834Updated last year
- Automatically brute force all services running on a target.☆2,094Updated 10 months ago
- Crack hashes in seconds.☆1,821Updated 6 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,266Updated 2 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,743Updated last month
- File upload vulnerability scanner and exploitation tool.☆3,214Updated last month
- hydra☆10,521Updated last week
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,382Updated 2 months ago
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- Striker is an offensive information and vulnerability scanner.☆2,287Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,127Updated 5 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,487Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,724Updated 2 weeks ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,207Updated 5 months ago
- SSH man-in-the-middle tool☆1,661Updated 3 years ago
- Small tool to capture packets from wlan devices.☆1,972Updated last month
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,316Updated 10 months ago