Skip to content
This repository has been archived by the owner on Feb 7, 2021. It is now read-only.

Latest commit

 

History

History
59 lines (37 loc) · 1.6 KB

README.md

File metadata and controls

59 lines (37 loc) · 1.6 KB


EvilEye – HikVision Toolset


License: GPL v3

EvilEye is a simple command-line password stuffing tool build using Python used for searching vulnerable HikVision devices opened to the internet.

📚 This project is still work in progress, use at own risk!


🍬 Features

The most noticeable features currently implemented in EvilEye:

  • Shodan Integration, search for HikVision devices using your Shodan account.
  • Notion Integration, Save, and collect found devices in your Notion tables.
  • Information Gatherer, get basic information about the device, like users or connected cameras.

🎉 Getting Started

To use EvilEye clone this repository and install necessary requirements:

python -m pip install -r requirements.txt

To get information about single device, type:

python evileye.py get -p <PASSWORD> <127.0.0.1:80>

This documentation will be build up as I go!


This project is for educational purposes only. Don't use it for illegal activities. I don't support nor condone illegal or unethical actions and I can't be held responsible for possible misuse of this software.


🚧 Contributing

You are more than welcome to help me build the EvilEye!

Just fork this project from the master branch and submit a Pull Request (PR).


📃 License

This project is licensed under GPL-3.0 .