mcbazza / cam-scanningLinks
Place to store my various exposed IoT cam-scanning work and info
☆19Updated last year
Alternatives and similar repositories for cam-scanning
Users that are interested in cam-scanning are comparing it to the libraries listed below
Sorting:
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆38Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆39Updated 3 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆56Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Fast Path Traversal exploitation tool☆21Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- A collection of DuckyScript payloads targeting Linux systems.☆19Updated this week
- ☆64Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated last month
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆33Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago
- ☆50Updated last year
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- ☆39Updated 5 months ago
- ☆77Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year