An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
☆398May 25, 2021Updated 4 years ago
Alternatives and similar repositories for camerattack
Users that are interested in camerattack are comparing it to the libraries listed below
Sorting:
- Cameradar hacks its way into RTSP videosurveillance cameras☆4,875Feb 23, 2026Updated last week
- Hacking CCTV cameras☆256May 16, 2022Updated 3 years ago
- The server which receives and stores Astronomer trust reports, and provides an endpoint to generate GitHub badges.☆15Jul 14, 2019Updated 6 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆19May 25, 2025Updated 9 months ago
- WebRTCCTV is a signaling server & webapp able to stream from RTSP cameras using WebRTC☆41Mar 15, 2018Updated 7 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆145Aug 11, 2017Updated 8 years ago
- DIY hack for a complete CCTV solution using open source software and smartphones.☆33Jun 28, 2016Updated 9 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- ☆13Jul 22, 2017Updated 8 years ago
- Hack Cctv Vuln 2020☆42Apr 6, 2020Updated 5 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Control remote computers using discord bot and python 3.☆183Apr 26, 2022Updated 3 years ago
- Gorsair gives root access on remote docker containers that expose their APIs☆850Dec 19, 2023Updated 2 years ago
- 802.11 IDS, visualizer, and analytics platform for the web☆29Jan 4, 2023Updated 3 years ago
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Sep 21, 2020Updated 5 years ago
- Keylogger for ethical hackers☆13Aug 25, 2021Updated 4 years ago
- IVC-KOLPAK - smart CCTV system powered with Telegram☆11Aug 28, 2020Updated 5 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- OSINT Tool to find Breached Credit Cards Information☆591Nov 29, 2023Updated 2 years ago
- A Python Script that prepairs and installs a Raspberry Pi compatiable distro to an SD Card☆16Aug 5, 2012Updated 13 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- ☆13Apr 24, 2023Updated 2 years ago
- vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It …☆2,075Jun 7, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Latest FUD GMail phishing webpage generator☆31Jun 27, 2020Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- USB Joystick adapter for CCTV Camera Pelco-D Pan-Tilt-Zoom Over RS485☆15Feb 27, 2017Updated 9 years ago
- Exploit Netwave and GoAhead IP Camera☆250Jul 9, 2018Updated 7 years ago
- This is a schematic for a cell phone jammer that works for the frequency band GSM 1900. It was part of my master's thesis at ITP/NYU. See…☆48Oct 21, 2014Updated 11 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,716Oct 8, 2023Updated 2 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆445Jan 21, 2019Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆1,407Jan 9, 2024Updated 2 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago