mcbazza / cam-scanningLinks
Place to store my various exposed IoT cam-scanning work and info
☆21Updated last year
Alternatives and similar repositories for cam-scanning
Users that are interested in cam-scanning are comparing it to the libraries listed below
Sorting:
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆133Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆109Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆51Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆138Updated 2 years ago
- 🕵️ Email osint tool☆62Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- The program for scanning and testing city cameras (DVR, RTSP, Hikvision) is a tool developed exclusively for educational purposes to anal…☆95Updated 5 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 4 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆49Updated last year
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆56Updated last week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆91Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- Discovering Typo Squatting on your domains!☆72Updated last year
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆47Updated 5 months ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆18Updated 2 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆47Updated 5 months ago
- Retrieve all mails of users related to a git repository, a git user or a git organization☆53Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 10 months ago
- ☆65Updated 2 years ago
- All-sources tool to search websites by favicons☆171Updated 9 months ago