Kamerka GUI stands as the ultimate reconnaissance tool for the Internet of Things (IoT) and Industrial Control Systems (ICS).
Developed with support from powerful platforms like Shodan and enhanced by resources from Binary Edge and WhoisXMLAPI, this tool offers an unparalleled view into the security posture of critical infrastructures worldwide.
Explore how Kamerka GUI leverages open-source information and exploits to pinpoint and analyze vulnerable connected devices across various sectors.
Shodan, Kamerka, are creating a “perfect storm” of
1. Scan for Internet facing Industrial Control Systems, Medical and Internet of Things devices based on country or coordinates.
2. Gather passive intelligence from WHOISXML, BinaryEdge and Shodan or active by scanning target directly.
3. Thanks to indicators from devices and google maps, pinpoit device to specific place or facility (hospital, wastewater treatment plant, gas station, university, etc.)
4. (Optional, not recommended) 4. Guess/Bruteforce or use default password to gain access to the device. Some exploits are implemented for couple specific IoTs.
5. Report devices in critical infrastructure to your local CERT.
Make sure your API keys are correct and put them in keys.json in main directory.
git clone https://github.com/woj-ciech/Kamerka-GUI/
pip3 install -r requirements.txt
python3 manage.py makemigrations
python3 manage.py migrate
python3 manage.py runserver
In a new window (in main directory) run celery worker celery worker -A kamerka --loglevel=info
For new version of Celery celery --app kamerka worker
In a new window fire up redis apt-get install redis
redis-server
And server should be available on http://localhost:8000/
For more information click here.
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…