Exploitation framework for IP cameras
☆21Jun 9, 2019Updated 6 years ago
Alternatives and similar repositories for CamSploit
Users that are interested in CamSploit are comparing it to the libraries listed below
Sorting:
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆145Aug 11, 2017Updated 8 years ago
- Exploit tool for Hikvision IP Camera.☆16Nov 30, 2020Updated 5 years ago
- ☆42Aug 27, 2024Updated last year
- Hikvision Backdoor using Shodan. Python file that scans IP's from Shodan.☆26Jan 11, 2024Updated 2 years ago
- MT Manager☆13Jun 3, 2023Updated 2 years ago
- Simple and convenient software for hacking other people's cams☆29Dec 11, 2017Updated 8 years ago
- A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.☆36Aug 5, 2025Updated 6 months ago
- ☆12Mar 8, 2025Updated 11 months ago
- Hikvision IP-cam Bruteforce☆33Feb 21, 2023Updated 3 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Jul 10, 2019Updated 6 years ago
- Extracts videos recorded by Hikvision IP camera☆32Apr 24, 2018Updated 7 years ago
- IP Camera Web-based FTP Viewer/Notifier (Hikvision, Amcrest)☆35Jun 29, 2020Updated 5 years ago
- Javascript Iq option API☆10Aug 22, 2024Updated last year
- Proof of concept of end2end functional testing with Puppeteer library, Mocha and Chai☆12Jun 22, 2018Updated 7 years ago
- Token Drop in Real World☆11Oct 27, 2021Updated 4 years ago
- Hikvision IP camera access bypass exploit, developed by golang.☆11Jan 11, 2021Updated 5 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- AVAPI Client for IOT security camera (find device in lan and generates rtsp streaming url)☆11Aug 20, 2021Updated 4 years ago
- Aplicación para hackear cuentas de Whatsapp, realizar seguimientos y rastreos de los mensajes y conversaciones entre usuarios.☆26Jul 14, 2024Updated last year
- ☆45Jan 26, 2026Updated last month
- Monetha: Decentralized Reputation Framework☆16Oct 21, 2019Updated 6 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the …☆11Sep 19, 2024Updated last year
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- A simple Python/Django CCTV system for IP cameras☆14Jan 15, 2017Updated 9 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Javascript PNG encoder☆21Oct 17, 2013Updated 12 years ago
- Read bytes from stdin and pass them to the remote host☆13Oct 12, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- gRPC server for MetaTrader 5 enabling trading application development in any programming language☆14Sep 13, 2025Updated 5 months ago
- On how to pick your random generator wiseley for Ethereum Contracts.☆13Jul 25, 2016Updated 9 years ago
- Hikvision camera CVE-2017-7921-EXP☆101Dec 4, 2023Updated 2 years ago
- Wrapper scripts to make documentation easier☆13Feb 11, 2026Updated 2 weeks ago
- 🛠️ ASIMOV Command-Line Interface (CLI).☆17Feb 16, 2026Updated last week
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 9 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated last year