Skip to content Dark Web Informer - Cyber Threat Intelligence

CamXploit: Discover and Analyze Exposed IP Cameras with Open Ports, Vulnerabilities, and Weak Credentials


GitHub: https://github.com/spyboy-productions/CamXploit


CamXploit is a reconnaissance tool designed to help researchers and security enthusiasts check if an IP address is hosting an exposed CCTV camera. It scans common camera ports, checks for login pages, tests default credentials, and provides useful search links for further investigation.

⚠️ Disclaimer: This tool is intended for educational and security research purposes only. Unauthorized scanning of systems you do not own is illegal. Use responsibly.


🚀 Features

✔️ Scans common CCTV ports (80, 443, 554, 8080, 8443)
✔️ Detects exposed camera login pages
✔️ Checks if the device is a camera stream
✔️ Identifies camera brands & known vulnerabilities
✔️ Tests for default credentials on login pages
✔️ Provides manual search links (Shodan, Censys, Zoomeye, Google Dorking)
✔️ Google Dorking suggestions for deeper recon


🛠️ Installation

1️⃣ Clone the Repository

git clone https://github.com/yourusername/CamXploit.git

cd CamXploit

pip install -r requirements.txt


python CamXploit.py

Enter the public IP address of the target device when prompted.

🔍 What It Does:

1️⃣ Scans open ports (Common CCTV ports)
2️⃣ Checks if a camera is present
3️⃣ If a camera is found, it:

  • Searches for login pages
  • Checks default credentials
  • Identifies camera brand & vulnerabilities
    4️⃣ Provides manual search URLs for deeper investigation

📸 Example Output


🤖 To-Do & Future Features

  •  Add multi-threaded scanning for speed
  •  Expand camera brand detection
  •  Implement logging feature

Latest