tamim1089 / HikvisionExploiterLinks
HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324 + CVE-2021-36260 Detection
☆157Updated 2 months ago
Alternatives and similar repositories for HikvisionExploiter
Users that are interested in HikvisionExploiter are comparing it to the libraries listed below
Sorting:
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 5 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆141Updated 9 months ago
- A fast subdomain takeover tool☆83Updated last year
- POC for CVE-2024-36991: This exploit will attempt to read Splunk /etc/passwd file.☆126Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆41Updated last year
- PowerShell Obfuscator☆210Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆322Updated last month
- Bypass 403☆164Updated 8 months ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆135Updated this week
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆73Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆79Updated last year
- Docker Remote API Scanner and Exploit☆177Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆96Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆41Updated 2 years ago
- ☆111Updated last week
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆153Updated 4 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated 2 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆86Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆88Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆65Updated 3 months ago
- CVE-2024-28955 Exploitation PoC☆34Updated last year
- ☆86Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- ☆74Updated 6 months ago
- Laravel RCE Exploitation Toolkit☆44Updated 3 weeks ago
- External recon toolkit☆53Updated 9 months ago
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆56Updated last year