Ingram is a powerful tool designed to scan for vulnerabilities in network cameras, supporting devices from major brands like Hikvision, Dahua, Uniview, and Dlink.
It operates on Linux and Mac systems, requiring Python 3.8 or higher, though Python 3.11 is not recommended due to compatibility issues.
To install Ingram, follow these steps:
git clone https://github.com/jorhelp/Ingram.git
to download the tool.cd Ingram pip3 install virtualenv python3 -m virtualenv venv source venv/bin/activate
pip3 install -r requirements.txt
.targets.txt
) with IP addresses or IP segments you want to scan. Each line should contain a single target, optionally specifying a port (e.g., 192.168.0.1:80
).python3 run_ingram.py -i targets.txt -o output_folder
. You can specify ports with -p
and concurrency with -t
.results.csv
, not_vulnerable.csv
) and snapshots of some devices.Ingram is strictly for security testing purposes and should not be used for illegal activities. The tool’s developers disclaim any responsibility for misuse.
Thanks to contributors like Aiminsun for CVE-2021-36260, chrisjd20 for Hikvision config file decryption, and mcw0 for DahuaConsole.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…