Place to store my various exposed IoT cam-scanning work and info
☆24Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for cam-scanning
Users that are interested in cam-scanning are comparing it to the libraries listed below
Sorting:
- CCBYNCSA Creative Commons Open Source Gelblaster XL series "Wingman" robotic turret mod inspired by U.S. Army TARDEC, Open Robotics ROS-M…☆28Feb 25, 2025Updated last year
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆31Feb 19, 2024Updated 2 years ago
- ☆12Dec 29, 2021Updated 4 years ago
- ☆35Mar 7, 2025Updated 11 months ago
- A tool for creating bitcoin stealing phishing clones of onion services on large scale☆36Aug 4, 2023Updated 2 years ago
- Generate realistic-looking fake meetings to fill up your Microsoft Outlook/Apple/Google calendar. Available in Python and PowerShell.☆32Jan 17, 2024Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Jan 10, 2025Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 11 months ago
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- Modular Antenna Tracker Caddy☆11Nov 14, 2023Updated 2 years ago
- Web UI for converting conveniently an image to ASCII art using multiple approaches☆14Feb 11, 2026Updated 3 weeks ago
- Real-time and historical 3D visualization of ADS-B aircraft data with 7 visual themes, mini radar, and interactive controls☆27Feb 23, 2026Updated last week
- iNaturalist Herbarium Label Generator: A command line tool to create formatted herbarium labels from iNaturalist observations, with RTF o…☆13Feb 25, 2026Updated last week
- A linux PCIe driver for Altera☆11Oct 9, 2018Updated 7 years ago
- Schematic of popular OP-COM (VAUX-COM) interface☆10May 19, 2019Updated 6 years ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆96Jan 16, 2026Updated last month
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Arduino PWM RGB LED controller with RS232 interface and a Mac OS X app☆10Feb 17, 2022Updated 4 years ago
- ⍺-MON anonymizes network traffic in real time. This software process network traffic on input interfaces to remove privacy sensitive info…☆12Sep 27, 2021Updated 4 years ago
- fast approximation for levenshtein distances☆11Jan 15, 2018Updated 8 years ago
- A Dockerfile implementation for PowerMTA servers☆10Jan 23, 2018Updated 8 years ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- Shell script to update ddnss.de records☆11Sep 13, 2020Updated 5 years ago
- Core code for Profiles RNS☆19Dec 18, 2025Updated 2 months ago
- DIGI-NETRA 🕵️♂️ is a Python OSINT toolkit for digital investigations. Trace phone numbers 📞, usernames 👤, IPs 🌐, and emails ✉️ with …☆25Aug 27, 2025Updated 6 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Golang setup boilerplate, fortified with Echo, sqlx, sql-migrate, and zap⚡️ promises an extraordinary journey for your next project. 🚀☆16Jun 17, 2024Updated last year
- Web page preview and analysis tool☆12Jan 11, 2023Updated 3 years ago
- SQRL Port of ethminer☆11Feb 1, 2021Updated 5 years ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated 11 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆10Oct 17, 2017Updated 8 years ago
- A proxy for Google Bard LLM☆10Nov 2, 2023Updated 2 years ago
- This repo contains a demo of adversarial strings poisoning vector database and forching specific hallucinations on RAG chatbot.☆10May 2, 2024Updated last year
- A fully-fledged network of yester-year to teach long forgotten security techniques☆10Feb 15, 2026Updated 2 weeks ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- netactuator is an active network management tool, for graphing individual host activities and make individual host behavior patterns.☆16Jul 17, 2011Updated 14 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago