diego-tella / HikvisionIN
A python script that look for hikvision vulnerable cams with a backdoor
☆23Updated last year
Alternatives and similar repositories for HikvisionIN:
Users that are interested in HikvisionIN are comparing it to the libraries listed below
- RtspBruter is a RTSP(Real Time Streaming Protocol) brute☆29Updated 4 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆35Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 8 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆56Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆60Updated 5 months ago
- Automated exploit scanner for cameras on the internet☆189Updated last year
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- Automatic tool to find Google Dorks☆33Updated 5 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 8 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated last week
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆59Updated 3 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated last year
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆71Updated last week
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 6 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆32Updated 9 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 8 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆56Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆31Updated 9 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆20Updated last year
- Hacking with PasteJacking technique☆21Updated 8 months ago
- PassBreaker☆58Updated 11 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- ☆118Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆38Updated last year