HikvisionExploiter is a powerful and automated exploitation toolkit targeting unauthenticated endpoints on Hikvision IP cameras, particularly those running firmware version 3.1.3.150324.
It performs:
- Snapshot access verification
- Config file retrieval and decryption
- User credential extraction
- Remote command execution using CVE-2021-36260
- Multithreaded target scanning with colored, timestamped logs
Built for researchers, red teamers, and IoT security enthusiasts.
- 🔓 Directory Check: Verifies
/onvif-http/snapshotendpoint for snapshot exposure - 📸 Snapshot Retrieval: Downloads snapshots and stores them in timestamped folders
- 🛰️ Device Info Dump: Parses device model, serial, firmware, and build data
- 👥 User Info Dump: Extracts usernames and privilege levels from XML
- 🔐 Config Decryption: Downloads encrypted
/System/configurationFile, decrypts using AES + XOR, and extracts credentials - 💣 CVE-2021-36260 Detection:
- Header bypass check on
/Security/users - PUT-to-file RCE check via
webLanguageinjection
- Header bypass check on
- 🖥️ Remote Shell Support: Built-in Bash shell for remote command execution
- 📁 Organized Logs: Creates structured logs per IP:port in
logs/ - ⚡ Mass Scanning: Supports thousands of targets using
ThreadPoolExecutor - 🎨 Colorized Output: Easily distinguishable results with ANSI colors
- Python 3.6+
pip install -r requirements.txtffmpeg(optional, for future snapshot-to-video capability)pycrypto(for config decryption):pip install pycrypto
git clone https://github.com/HexBuddy/HikvisionExploiter.git
cd HikvisionExploiter
pip3 install -r requirements.txtCreate a targets.txt file with the following format:
IP:PORT
Example:
192.168.1.10:80
10.10.10.20:81
python3 checker.pyThis will:
- Check for snapshot access
- Download and parse device/user info
- Attempt config file decryption
- Test for RCE via CVE-2021-36260
- Save all logs under
logs/IP_PORT_TIMESTAMP/
To interactively run commands on a vulnerable device:
chmod +x shell.sh
./shell.sh <ip:port>Example:
./shell.sh 192.168.1.10:80If vulnerable, you'll enter an interactive shell:
hikvision-shell> uname -a
Linux hik-cam 3.0.8 #1 Wed Mar 18 ...
Use the following Shodan dork to locate exposed Hikvision cameras:
3.1.3.150324
A Nuclei-compatible template is included: nuclei-template.yaml
Usage:
nuclei -t nuclei-template.yaml -list targets.txtDetects:
- Open snapshot feed
- Exposed config download
- Leaked user info via XML
MIT License ©
See LICENSE for more details.
Telegram: @HexBuddy127001
Built with ❤️ for educational and ethical research only.