Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)
☆20Aug 12, 2020Updated 5 years ago
Alternatives and similar repositories for hikvisionBackdoorExploit
Users that are interested in hikvisionBackdoorExploit are comparing it to the libraries listed below
Sorting:
- Exploitation framework for IP cameras☆21Jun 9, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Simple and convenient software for hacking other people's cams☆29Dec 11, 2017Updated 8 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- Exploit tool for Hikvision IP Camera.☆16Nov 30, 2020Updated 5 years ago
- ☆42Aug 27, 2024Updated last year
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Oct 13, 2019Updated 6 years ago
- MT Manager☆13Jun 3, 2023Updated 2 years ago
- A Python based Nessus GUI Parser that parses .nessus files and generates two structured HTML Reports - VA Table and Detailed Findings.☆16Apr 19, 2025Updated 10 months ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆24Aug 27, 2019Updated 6 years ago
- Hikvision IP-cam Bruteforce☆33Feb 21, 2023Updated 3 years ago
- ChipWhisperer CW308 UFO Target Hardware Files☆41Aug 13, 2025Updated 6 months ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Jul 10, 2019Updated 6 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- Spam SMS unlimited with web api Indih0m3☆22Feb 18, 2022Updated 4 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- bot and proxy for Minecraft☆24May 7, 2013Updated 12 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- Perintah : $pkg update && pkg upgrade $pkg install python2 $pkg install git $git clone https://github.com/spider-fb/spider-fb $pip2 …☆10Jul 10, 2020Updated 5 years ago
- Cie1931 based PWM DC Generator for linear LED brightness ramps☆16Jun 7, 2023Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- 2.4Ghz Wifi networks spot jamming device, utilizing ESP32 and nRF24L01+☆13Jan 5, 2024Updated 2 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Collection of various wordlists☆37May 11, 2019Updated 6 years ago
- The Bitmark Device☆10Oct 13, 2015Updated 10 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Serial control of Cisco PrecisionHD cameras☆10Jul 30, 2023Updated 2 years ago
- some tests for portaudio on android with opensles☆10Sep 5, 2021Updated 4 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago