We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[homepage] https://github.com/TasosY2K/camera-exploit-tool [/homepage]
[tags] camera, exploitation, scanner [/tags]
[short_descr] Automated exploit scanner for cameras on the internet. [/short_descr]
[long_descr]
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
[+] Hikvision
[+] Avtech
[+] TVT
[+] Cacti
more to come...
To use this tool you need to have the following:
git clone https://github.com/TasosY2K/camera-exploit-tool pip install -r requirements.txt python3 scanner.py --help
# Collect Hikvision hosts python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Hikvision IP Camera"' --pages 1 # Collect Avtech hosts python3 scanner.py --shodan --api-token <shodan_token> --query 'linux upnp avtech' --pages 1 # Collect TVT hosts python3 scanner.py --shodan --api-token <shodan_token> --query 'product:"Cross Web Server"' --pages 1 # Collect Cacti hosts python3 scanner.py --shodan --api-token <shodan_token> --query 'Login to Cacti' --pages 1
python3 scanner.py --check --proxy-file proxies.txt --threads 20
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"
https://www.exploit-db.com/exploits/40500
2021-36260 https://www.exploit-db.com/exploits/50441
https://github.com/k1p0d/h264_dvr_rce
CVE-2022-46169 https://github.com/sAsPeCt488/CVE-2022-46169
[/long_descr]
[image]
[/image]
The text was updated successfully, but these errors were encountered:
Issue correctly handled, tool is waiting for human validation.
Sorry, something went wrong.
Tool has been refused by the team, feel free to get in touch if you have any question.
Thank you!
No branches or pull requests
[homepage]
https://github.com/TasosY2K/camera-exploit-tool
[/homepage]
[tags]
camera, exploitation, scanner
[/tags]
[short_descr]
Automated exploit scanner for cameras on the internet.
[/short_descr]
[long_descr]
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
![image](https://user-images.githubusercontent.com/98208035/235867732-20fb5f8b-9ba1-4df2-8576-cc5f05abe2c0.png)
![image](https://user-images.githubusercontent.com/98208035/235867800-340cf4b2-bbd3-4f7a-aad4-902e4940c573.png)
![image](https://user-images.githubusercontent.com/98208035/235867824-14ee5357-40a9-4130-ba02-cb99b2f7da62.png)
Vendors Affected
[+] Hikvision
[+] Avtech
[+] TVT
[+] Cacti
more to come...
Features
Prerequisites
To use this tool you need to have the following:
Installation
Usage
Collect hosts in database
Check hosts for exploit
Automatically run command on exploited hosts
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"
Exploits Used
https://www.exploit-db.com/exploits/40500
2021-36260 https://www.exploit-db.com/exploits/50441
https://github.com/k1p0d/h264_dvr_rce
CVE-2022-46169 https://github.com/sAsPeCt488/CVE-2022-46169
[/long_descr]
[image]
![image](https://user-images.githubusercontent.com/98208035/235868212-b0403dd7-bccf-4ff5-8e50-69856dcb055c.png)
[/image]
The text was updated successfully, but these errors were encountered: