EvilEye is a simple command-line password stuffing tool build using Python used for searching vulnerable HikVision devices opened to the internet.
π This project is still work in progress, use at own risk!
The most noticeable features currently implemented in EvilEye:
- Shodan Integration, search for HikVision devices using your Shodan account.
- Notion Integration, Save, and collect found devices in your Notion tables.
- Information Gatherer, get basic information about the device, like users or connected cameras.
To use EvilEye clone this repository and install necessary requirements:
python -m pip install -r requirements.txt
To get information about single device, type:
python evileye.py get -p <PASSWORD> <127.0.0.1:80>
This documentation will be build up as I go!
This project is for educational purposes only. Don't use it for illegal activities. I don't support nor condone illegal or unethical actions and I can't be held responsible for possible misuse of this software.
You are more than welcome to help me build the EvilEye!
Just fork this project from the master
branch and submit a Pull Request (PR).
This project is licensed under GPL-3.0 .