Exploitation Tools

HikvisionExploiter – Automated Exploitation And Surveillance Utility For Hikvision Cameras

HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network cameras exploiting the Web interface Version 3.1.3.150324.

It downloads snapshots and compiles them into videos for efficient surveillance monitoring, Then retrieves the camera device info and downloads the “configurationFile” to all the registered Users Creds.

Table Of Contents

  • Features
  • Requirements
  • Installation
  • Usage
  • Configuration
  • Finding Targets
  • License

Features

  1. Automated Directory Accessibility Checks for Hikvision Cameras
  2. Snapshot Downloading and Storage
  3. Device Information Retrieval and Logging
  4. User Information Retrieval and Logging
  5. Encrypted Configuration File Downloading and Decryption
  6. Comprehensive CVE Vulnerability Checks
    • CVE-2021-36260 Detection
    • CVE-2017-7921 Detection
    • CVE-2022-28171 Detection
  7. Multi-Target Support with targets.txt
  8. Detailed Logging for Each Target
  9. Real-Time Feedback with Colored Output
  10. Interrupt Handling with SIGQUIT
  11. Customizable Configuration Options
  12. Organized Output for Snapshots, Logs, and Decrypted Files

Requirements

  • Python 3.6 or higher
  • FFmpeg
  • requests library
  • PyCrypto library (for decrypt_configurationFile.py, install using pip install pycrypto)

Installation

Clone The Repository

git clone https://github.com/HexBuddy/HikvisionExploiter.git
cd HikvisionExploiter

Install required packages

pip3 install -r requirements.txt

Install FFmpeg

Download and install FFmpeg from FFmpeg’s official website.

Usage

Create a targets.txt file

Create a targets.txt file in the root directory of the project with the following format:

IP:PORT

Each line should contain an IP address and port of a Hikvision camera.

Run The Script

python3 checker.py

The script will check the accessibility of the directories on the specified cameras, download snapshots, and compile them into videos.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

5 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

1 week ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

1 week ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago