All Projects → entynetproject → Entropy

entynetproject / Entropy

Licence: gpl-3.0
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Entropy

Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+47.62%)
Mutual labels:  kali-linux, hacking, exploit, hacking-tool, payload, hacker, metasploit
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+12.7%)
Mutual labels:  kali-linux, hacking, hacking-tool, payload, metasploit
M3m0
M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-1.59%)
Mutual labels:  hacking, exploit, hacking-tool, hacker
Hackers Tool Kit
Its a framework filled with alot of options and hacking tools you use directly in the script from brute forcing to payload making im still adding more stuff i now have another tool out called htkl-lite its hackers-tool-kit just not as big and messy to see updates check on my instagram @tuf_unkn0wn or if there are any problems message me on instagram
Stars: ✭ 211 (+67.46%)
Mutual labels:  exploit, payload, hacker, metasploit
Icg Autoexploiterbot
Wordpress 🔥 Joomla 🔥 Drupal 🔥 OsCommerce 🔥 Prestashop 🔥 Opencart 🔥
Stars: ✭ 242 (+92.06%)
Mutual labels:  hacking, exploit, hacking-tool, hacker
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+142.06%)
Mutual labels:  kali-linux, hacking, hacking-tool, hacker
Oxidtools
200 TOOLS BY 0XID4FF0X FOR TERMUX
Stars: ✭ 143 (+13.49%)
Mutual labels:  hacking, exploit, hacking-tool, hacker
Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-75.4%)
Mutual labels:  shodan, kali-linux, payload, metasploit
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (+75.4%)
Mutual labels:  kali-linux, hacking, hacking-tool, hacker
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (+115.87%)
Mutual labels:  kali-linux, hacking, hacking-tool, metasploit
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+899.21%)
Mutual labels:  kali-linux, hacking, hacking-tool, metasploit
Onex
onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Termux and other Linux distributions. onex can install any third party tool or any hacking tool for you.
Stars: ✭ 537 (+326.19%)
Mutual labels:  kali-linux, hacking, hacking-tool
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+326.98%)
Mutual labels:  kali-linux, hacking, hacking-tool
Brutal
Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )
Stars: ✭ 678 (+438.1%)
Mutual labels:  hacking, payload, hacker
Hack Tools
hack tools
Stars: ✭ 488 (+287.3%)
Mutual labels:  hacking, exploit, hacking-tool
Msfpc
MSFvenom Payload Creator (MSFPC)
Stars: ✭ 808 (+541.27%)
Mutual labels:  kali-linux, payload, metasploit
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+611.9%)
Mutual labels:  hacking, exploit, hacking-tool
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+687.3%)
Mutual labels:  kali-linux, hacking, exploit
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+7027.78%)
Mutual labels:  kali-linux, hacking, hacking-tool
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+276.19%)
Mutual labels:  hacking, exploit, hacking-tool

Entropy Toolkit

logo


About Entropy Toolkit

Entropy Toolkit is a set of tools to provide Netwave 
and GoAhead IP webcams attacks. Entropy Toolkit is a 
powerful toolkit for webcams penetration testing.

Getting started

Entropy installation

cd entropy

chmod +x install.sh

./install.sh

Entropy uninstallation

cd entropy

chmod +x uninstall.sh

./uninstall.sh


Entropy Toolkit execution

To run Entropy Toolkit you should 
execute the following command.

entropy

usage: entropy [-h] [-b [1|2]] [-o <output_path>] [--timeout <timeout>]
               [-t <tasks>] [-c <count>] [-q | -v]
               [-a <ip:port> | -i <input_file> | --shodan <api> | --zoomeye <api>]
               [-u] [--version]

optional arguments:
  -h, --help            show this help message and exit
  -b [1|2], --brand [1|2]
                        Choose the brand of IP webcam. (1)Netwave, (2)GoAhead.
  -o <output_path>, --output <output_path>
                        Output to the specified path.
  --timeout <timeout>   Timeout in seconds.
  -t <tasks>, --task <tasks>
                        Run tasks number of connects in parallel.
  -c <count>, --count <count>
                        The number of IP you want to get.
  -q, --quiet           Quiet mode.
  -v, --verbose         Verbose mode.
  -a <ip:port>, --address <ip:port>
                        IP and port of the webcam.
  -i <input_file>, --input <input_file>
                        List of webcams addresses.
  --shodan <api>        Attack through Shodan.
  --zoomeye <api>       Attack through ZoomEye.
  -u, --update          Update Entropy Toolkit.
  --version             Show Entropy Toolkit version.

Entropy Toolkit examples

Example of attacking a single webcam

entropy -b 1 -i 192.168.1.100:80 -v

Example of attacking webcams from a file

entropy -b 2 -l iplist.txt -v

Example of attacking webcams through Shodan

entropy -b 2 -v --shodan PSKINdQe1GyxGgecYz2191H2JoS9qvgD


Entropy Toolkit disclaimer

Usage of the Entropy Toolkit for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state, federal, and international laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].