Skip to content
This repository has been archived by the owner on Feb 7, 2021. It is now read-only.
/ evileye Public archive

πŸ‘ Credential stuffing tool integrated with Shodan and Notion for HikVision cameras.

License

Notifications You must be signed in to change notification settings

Deep-Cold-Storage/evileye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

10 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


EvilEye – HikVision Toolset


License: GPL v3

EvilEye is a simple command-line password stuffing tool build using Python used for searching vulnerable HikVision devices opened to the internet.

πŸ“š This project is still work in progress, use at own risk!


🍬 Features

The most noticeable features currently implemented in EvilEye:

  • Shodan Integration, search for HikVision devices using your Shodan account.
  • Notion Integration, Save, and collect found devices in your Notion tables.
  • Information Gatherer, get basic information about the device, like users or connected cameras.

πŸŽ‰ Getting Started

To use EvilEye clone this repository and install necessary requirements:

python -m pip install -r requirements.txt

To get information about single device, type:

python evileye.py get -p <PASSWORD> <127.0.0.1:80>

This documentation will be build up as I go!


This project is for educational purposes only. Don't use it for illegal activities. I don't support nor condone illegal or unethical actions and I can't be held responsible for possible misuse of this software.


🚧 Contributing

You are more than welcome to help me build the EvilEye!

Just fork this project from the master branch and submit a Pull Request (PR).


πŸ“ƒ License

This project is licensed under GPL-3.0 .

About

πŸ‘ Credential stuffing tool integrated with Shodan and Notion for HikVision cameras.

Topics

Resources

License

Stars

Watchers

Forks

Languages