Kamerka is a tool to build interactive map of cameras from Shodan. The script creates a map of cameras, printers, tweets and photos based on your coordinates. Everything is clearly presented in form of interactive map with icons and popups.
pip install -r requirements.txt
Put your API keys in lines 85-99
To use Instagram module, you have to add additional method to InstagramAPI.py file.
def geosearchLocation(self, lat, lon):
return self.SendRequest('location_search/?latitude=' + str(lat)+'&longitude='+str(lon)+'&rank_token=' + self.rank_token)
Also ReadNodeJsScan – Static Security Code Scanner For Node.js Applications
root@kali:~/# python kamerka.py -h
Fail to import moviepy. Need only for Video upload.
usage: kamerka.py [-h] [--lat LAT] [--lon LON] [--radius RADIUS] [--dark]
[--twitter] [--camera] [--flickr] [--instagram] [--printer]
o#######o
o###########o
o#############o
#################
###### \########o
#;^ _^,/---\#####!
,` /^_ .-~^~-.__\#
/ ^\/,,@@@,, ;|
| \!!@@@@@!! ^,
#. .\; '9@@@P' ^,
###./^ ----,_^^ /@-._
^--._,o@@@@@@
^;@@@@@@@@@
^-;@@@@
ꓘamerka 2.0 (FIST) - Build interactive map of cameras, tweets and photos
medium.com/@woj_ciech github.com/woj-ciech
python kamerka.py -h
Example: python kamerka.py --lat 37.235 --lon 115.811111 --dark --twitter --camera --printer
optional arguments:
-h, --help show this help message and exit
--radius RADIUS Radius in km (Default 3)
--dark Dark Theme
--twitter Twitter module
--camera Camera module
--flickr Flickr module
--instagram Instagram module
--printer Printer module
Required arguments:
--lat LAT Latitude
--lon LON Longitude
root@kali:~/#python kamerka.py --lat 37.8368723 --lon -122.2645793 --camera --flickr --instagram --twitter --printer
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…