https://github.com/krakodjaba/hikvisonin-ng
This script scans a specified range of IP addresses for vulnerable Hikvision cameras using common ports (80, 554, 8080). If a vulnerable camera is found, it attempts to download a snapshot from it.
https://github.com/krakodjaba/hikvisonin-ng
Last synced: about 2 months ago
JSON representation
This script scans a specified range of IP addresses for vulnerable Hikvision cameras using common ports (80, 554, 8080). If a vulnerable camera is found, it attempts to download a snapshot from it.
- Host: GitHub
- URL: https://github.com/krakodjaba/hikvisonin-ng
- Owner: krakodjaba
- Created: 2024-11-26T14:58:28.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2024-11-26T15:00:49.000Z (6 months ago)
- Last Synced: 2025-02-06T13:18:09.537Z (4 months ago)
- Language: Python
- Size: 12.7 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README-OLD - Script.py.md
Awesome Lists containing this project
README
# HikvisionIN
A python script that look for hikvision vulnerable cams with a backdoor.![]()
Using a valid shodan API key, this script will search for IPs on the internet, using a dork to find HikVision cameras. Once found, it will test to check if it is vulnerable to a backdoor.Install
```
git clone https://github.com/diego-tella/HikvisionIN/
cd HikvisionIN
pip install shodan
python script.py
```Usage
```
usage: script.py [-h] [-d DORK] [-s] [-v] -api APITOKEN
```
`-d` to define a custom dork.
`-s` to save snapshots from vulnerable cams.
`-v` verbose mode.
`-api` your Shodan API token.
`-h` help menu.
Example:
```
python script.py -d "Hikvision 2015" -v -s -api API_TOKEN
```