Kali Linux Tools

Vid2img-extract all frame from a given video

Introduction to Vid2img Tool:

A script written in Python called the vid2img tool can extract every frame from a given video. Any device with Python installed can use this tool

Installation vid2img tool (python 3)

  • Kali-Linux

sudo apt-get update -y && sudo apt-get upgrade -y

sudo apt install git python3 -y

git clone https://github.com/turbo-hackers/Vid2img.git

cd Vid2img

make install

python3 vid2img -h

  • Termux

apt-get update -y && apt-get upgrade -y

pkg install git python3 -y

git clone https://github.com/turbo-hackers/Vid2img.git

cd Vid2img

make termux-install

python3 vid2img  -h

USAGE

  • python3 vid2img
  • set frame per second to extract frames

Note:- Don’t delete any of the scripts included in core files

MODULES NEEDED :

opencv-python, numpy, rich

UNINSTALLATION :

make uninstall

WARNING :

This tool is only meant to be used for learning. We will not be held accountable if you use this tool for anything other than educational purposes.

Please consider following and supporting us to stay updated with the latest info

Aman Mishra

Aman Mishra is a eJPT certified and always keen to learn new concepts and methodologies regarding cybersecurity.he is also a cyber security content writer and have passion for sharing my knowledge about the latest threads and trends in the industry.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

9 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

9 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

9 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

9 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

10 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

12 hours ago