Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

SarmadBytes/CAM-DUMPER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

12 Commits

Repository files navigation

cam-dumper

Take webcam shots from target just sending a malicious link

How it works?

The tool generates a malicious HTTPS page using Serveo or Ngrok Port Forwarding methods, and a javascript code to cam requests using MediaDevices.getUserMedia.

The MediaDevices.getUserMedia() method prompts the user for permission to use a media input which produces a MediaStream with tracks containing the requested types of media. That stream can include, for example, a video track (produced by either a hardware or virtual video source such as a camera, video recording device, screen sharing service, and so forth), an audio track (similarly, produced by a physical or virtual audio source like a microphone, A/D converter, or the like), and possibly other track types.

See more about MediaDEvices.getUserMedia() here

To convince the target to grant permissions to access the cam, the page uses a javascript code made by https://github.com/wybiral that turns the favicon into a cam stream.

Installing (Kali Linux/Termux):

$apt update && apt upgrade
$apt install git
$apt install php
$git clone https://github.com/LiNuX-Mallu/CAM-DUMPER.git
$cd CAM-DUMPER
$chmod +x camdumper.sh ngrok
$bash camdumper.sh
then make your hotspot on and choose ngrok because serveo is down.. BINGO🔥

About

KALI LINUX / TERMUX tool for hacking victim android front camera.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 65.3%
  • HTML 23.5%
  • PHP 11.2%

AltStyle によって変換されたページ (->オリジナル) /