• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

camera

  1. itsMe

    Phyton Build Complete Webcam Security Camera | Python OpenCv & Pyqt

    Step-by-step guide| Build your own webcam security camera alert system using Python Pyqt OpenCv QtDesigner from scratch What you’ll learn     How to detect and recognize objects in webcam-captured images using OpenCV Python code.     Learn to convert images to greyscale, the difference...
  2. itsMe

    Easy Instagram Reels in Canva: Without Being on Camera

    Create 15 Beginner-Friendly Instagram Reels For Your Business or Your Clients Using Canva. Description If you’re wanting to learn how to create powerful, beginner-friendly Instagram Reels which don’t require you to show up on camera - this course is for you! Whether you’re looking to master...
  3. LSDeep

    ZCam - Python Camera Hacking Tool

    Hidden content
  4. itsMe

    Animated Overlay / Glitch Energy Camera – Mov

    .Mov Hidden content
  5. itsMe

    CamPhish - Grab Cam Shots From Target'S Phone Front Camera Or PC Webcam Just Sending A Link

    What is CamPhish? CamPhish is techniques to take cam shots of target's phone fornt camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses ngrok & serveo to generate a link which we will forward to the target, which can be used on over internet. website asks for...
  6. dEEpEst

    How To Detect A Hidden Camera In A Room.

    HOW TO DETECT A HIDDEN CAMERA IN A ROOM. When you stay in a hotel, how do you know there is no room secret pinhole camera? When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be...
  7. dEEpEst

    IP Camera default Username Password list

    IP Camera default Username Password list IP Camera Username and pasword in the following format: username/password: Hidden content
  8. dEEpEst

    Hacking IP camera

    Deauthenticating specifically the IP camera (only one client) aireplay-ng --deauth [number of deauth packets] -a [AP MAC address] -c [IP camera MAC address] [interface] Ex: aireplay-ng --deauth 1000 -a 11:22:33:44:55:66 -c 00:AA:11:22:33:44 mon0 You can possibly find the MAC address of the...
  9. 1

    Exploits Hisilicon Hi3518 HD Camera Remote Configuration Disclosure

    Hisilicon Hi3518 HD camera remote configuration disclosure exploit. View the full article
  10. 1

    Exploits FOSCAM FI8608W Camera Remote Configuration Disclosure

    FOSCAM FI8608W Camera remote configuration disclosure exploit. View the full article
  11. 1

    Exploits Digitus DN-16048 Camera Remote Configuration Disclosure

    Digitus DN-16048 Camera remote configuration disclosure exploit. View the full article
  12. 1

    Exploits ACTi ACM-5611 Video Camera Remote Command Execution

    ACTi ACM-5611 video camera remote command execution exploit. View the full article
  13. 1

    Exploits ACTi ACM-3100 Camera Remote Command Execution

    ACTi ACM-3100 Camera remote command execution exploit. View the full article
  14. dEEpEst

    Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point

    Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point * Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and...
  15. 1

    Exploits Clever Dog Smart Camera DOG-2W / DOG-2W-V4 File Disclosure / Backdoor

    Clever Dog Smart Camera types DOG-2W and DOG-2W-V4 suffer from file disclosure, default telnet backdoor credential, and insecure transit vulnerabilities. View the full article
  16. 1

    Exploits Starry Router Camera PIN Brute-Force / CORS Incorrect

    Starry Router Camera suffers from vulnerabilities where the PIN can be brute-forced and the HTML5 CORS ORIGIN is set with a wildcard. View the full article
  17. 1

    Exploits BEWARD N100 H.264 VGA IP Camera M2.1.6 Root Remote Code Execution

    BEWARD N100 H.264 VGA IP Camera version M2.1.6 suffers from two authenticated command injection vulnerabilities. The issues can be triggered when calling ServerName or TimeZone GET parameters via the servertest page. This can be exploited to inject arbitrary system commands and gain root remote...
  18. 1

    Exploits BEWARD N100 H.264 VGA IP Camera M2.1.6 Arbitrary File Disclosure

    BEWARD N100 H.264 VGA IP Camera version M2.1.6 suffers from an authenticated file disclosure vulnerability. Input passed via the 'READ.filePath' parameter in fileread script is not properly verified before being used to read files. This can be exploited to disclose the contents of arbitrary...
  19. 1

    Exploits BEWARD N100 H.264 VGA IP Camera M2.1.6 Cross Site Request Forgery

    BEWARD N100 H.264 VGA IP Camera version M2.1.6 suffers from a cross site request forgery vulnerability. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain...
  20. 1

    Exploits BEWARD N100 H.264 VGA IP Camera M2.1.6 Unauthenticated RTSP Stream Disclosure

    BEWARD N100 H.264 VGA IP Camera M2.1.6 suffers from an unauthenticated and unauthorized live RTSP video stream access. View the full article
Back
Top