CamXploit is a reconnaissance tool designed to help researchers and security enthusiasts check if an IP address is hosting an exposed CCTV camera. It scans common camera ports, checks for login pages, tests default credentials, and provides useful search links for further investigation.
✔️ Scans common CCTV ports (80, 443, 554, 8080, 8443)
✔️ Detects exposed camera login pages
✔️ Checks if the device is a camera stream
✔️ Identifies camera brands & known vulnerabilities
✔️ Tests for default credentials on login pages
✔️ Provides manual search links (Shodan, Censys, Zoomeye, Google Dorking)
✔️ Google Dorking suggestions for deeper recon
git clone https://github.com/yourusername/CamXploit.git
cd CamXploit
pip install -r requirements.txt
python CamXploit.py
Enter the public IP address of the target device when prompted.
1️⃣ Scans open ports (Common CCTV ports)
2️⃣ Checks if a camera is present
3️⃣ If a camera is found, it:
- Searches for login pages
- Checks default credentials
- Identifies camera brand & vulnerabilities
4️⃣ Provides manual search URLs for deeper investigation
- Add multi-threaded scanning for speed
- Expand camera brand detection
- Implement logging feature
Feel free to submit issues, suggestions, or pull requests!