PoC exploits and tools for conducting vulnerability research against AJCloud Wi-Fi security camera products
☆37Feb 6, 2025Updated last year
Alternatives and similar repositories for camera-hacks
Users that are interested in camera-hacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10May 12, 2017Updated 8 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 3 years ago
- uploads unlimited files to mega.nz without a subscription☆12Mar 19, 2026Updated last month
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 5 months ago
- Peer to Peer botnet☆13Aug 7, 2020Updated 5 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- DrayTek Vigor password recovery, config & firmware tools☆11Jul 18, 2015Updated 10 years ago
- ☆12Aug 29, 2024Updated last year
- ☆18Sep 22, 2018Updated 7 years ago
- A simple example of botnet using IPFS and IPNS protocols as way for controller of botnet☆17May 4, 2018Updated 7 years ago
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆16Aug 20, 2024Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- ☆13Feb 16, 2015Updated 11 years ago
- Node scraper that checks for links in different places and creates a json file with a direct reference to any mega.co.nz links posted in …☆16Jul 23, 2017Updated 8 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- redis主从复制windows和Linux 6.x☆11Nov 15, 2021Updated 4 years ago
- mega.nz direct link generator☆21Jun 19, 2025Updated 10 months ago
- 2023HW漏洞整理☆38Sep 3, 2024Updated last year
- 本项目是针对 FnOS 系统的综合漏洞利用工具,提供 Web UI (网页版) 和 Desktop GUI (桌面版) 两种交互模式,整合了资产管理、漏洞扫描、文件浏览、远程命令执行 (RCE) 及凭据窃取等核心功能。☆29Feb 7, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- for learning☆19Aug 22, 2021Updated 4 years ago
- Reverse Engineering notes on the Dxingtek/Keytech(?) WiFi@SDCF card☆22Feb 20, 2018Updated 8 years ago
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆24Nov 29, 2021Updated 4 years ago
- ☆16Feb 9, 2026Updated 2 months ago
- Golang C2 Client + PHP API Handler☆14Aug 1, 2023Updated 2 years ago
- 命令行版向日葵RCE漏洞利用工具 / cmd version of sunlogin exploit tool☆15Mar 26, 2022Updated 4 years ago
- [MOVED TO GITLAB] A ShareX uploader server written in Python Flask, also featuring a web frontend and a dashboard.☆11Aug 5, 2021Updated 4 years ago
- Telegram bot that scrape website☆20Jan 24, 2023Updated 3 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Streaming server for A9 wifi cameras☆25Mar 25, 2024Updated 2 years ago
- 2D fluid simulation implementation of Jos Stam paper on real-time fuild dynamics, including some suggested extensions.☆13Apr 17, 2021Updated 5 years ago
- Collection of Network Vulnerability Scanners (botnet loaders/exploits)☆17Feb 13, 2026Updated 2 months ago
- ☆15Aug 13, 2014Updated 11 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆23Sep 18, 2023Updated 2 years ago
- Perform with Massive Command Injection (Chamilo)☆23Jul 31, 2023Updated 2 years ago