https://github.com/byt3n33dl3/camhoundad
Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.
Science Score: 26.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
✓.zenodo.json file
Found .zenodo.json file -
○DOI references
-
○Academic publication links
-
○Committers with academic emails
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (9.4%) to scientific vocabulary
Keywords
Keywords from Contributors
Repository
Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.
Basic Info
- Host: GitHub
- Owner: byt3n33dl3
- License: lgpl-2.1
- Language: C
- Default Branch: main
- Homepage: https://blog.tmeletlidis.tech
- Size: 3.31 MB
Statistics
- Stars: 22
- Watchers: 1
- Forks: 0
- Open Issues: 0
- Releases: 2
Topics
Metadata Files
README.md
CamHoundAD
This is a tool meant to assist Cyber Security researchers on Discovering outdated and Vulnerable camera systems on the internet by utilizing shodan.io. I was able to discover thousands of vulnerable cameras using it. It could be for Cammera Attacks research, CCTV's Attacks research, etc.
Vendors Affected
[+] Hikvision
[+] Nikon
[+] Avtech
[+] GoPro
[+] TVT
[+] Cacti
Coming Soon . . .
Features
- Fetching of hosts from shodan.io
- Check for vulnerable cameras
- Automatically run commands on exploited Devices
- Automatically grab camera credentials
- Multi-threading for faster scanning
- Usage of Socks5 proxies for anonymity
- Storing results in Sqlite3 database
- Logging all actions in log files
Prerequisites
To use this tool you need to have the following: - Shodan API Key - Socks5 authenticated proxies
Installation
python
git clone https://github.com/byt3n33dl3/CamHoundAD
pip install -r requirements.txt
python3 scanner.py --help
Usage
Collect hosts in database
```python
Collect Hikvision hosts
python3 scanner.py --shodan --api-token
Collect Avtech hosts
python3 scanner.py --shodan --api-token
Collect TVT hosts
python3 scanner.py --shodan --api-token
Collect Cacti hosts
python3 scanner.py --shodan --api-token
Check hosts for exploit
python
python3 scanner.py --check --proxy-file proxies.txt --threads 20
Automatically run command on exploited hosts
python
python3 scanner.py --autopwn --proxy-file proxies.txt --payload "id"
About CamHoundAD
This tool is purely educational and is inteded to make the internet more secure. I will not be responsible for any direct or indirect damage caused due to the usage of this tool, it is for educational purposes only. Any PR's or suggestions on improving this project are welcome
Exploits Used
Owner
- Name: Sulaiman
- Login: byt3n33dl3
- Kind: user
- Location: Error 403: Not on earth
- Website: https://byt3n33dl3.substack.com/
- Twitter: byt3n33dl3
- Repositories: 91
- Profile: https://github.com/byt3n33dl3
I N F R A X 8 6
GitHub Events
Total
- Watch event: 10
Last Year
- Watch event: 10
Committers
Last synced: 7 months ago
Top Committers
| Name | Commits | |
|---|---|---|
| lean | t****s@p****m | 17 |
| CappaX | s****9@g****m | 9 |
| dependabot[bot] | 4****] | 1 |
Issues and Pull Requests
Last synced: 7 months ago
All Time
- Total issues: 0
- Total pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Total issue authors: 0
- Total pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels
Dependencies
- SQLAlchemy ==1.4.44
- requests ==2.31.0
- shodan ==1.28.0
- termcolor ==1.1.0