wz_mini_hacks
Camera hack
Enhances camera capabilities on Ingenic-based devices by allowing firmware customization and root access.
wz camera mods... make your camera better.
1k stars
45 watching
114 forks
Language: Shell
last commit: about 1 month ago Related projects:
Repository | Description | Stars |
---|---|---|
hasanfirnas/symbiote | Allows remote access to a phone's camera by sending a link | 830 |
youzouzou/wxapp | A set of reusable UI components and interactive features for building WeChat mini-programs. | 554 |
souravbaghz/canghost | Automated script for simulating and replaying CAN bus packets to practice car hacking or testing | 121 |
hackershackofficial/smart-security-camera | An IoT security camera system that uses object detection and sends email updates with images of detected objects | 561 |
lemariva/micropython-camera-driver | Adds camera support to MicroPython for ESP32 family devices | 459 |
kostasereksonas/besder-6024pb-xma501-ip-camera-security-investigation | Security analysis of an IP camera to identify potential vulnerabilities and weaknesses in its design and implementation | 21 |
siguza/v0rtex | An exploit tool for iOS Surface vulnerabilities | 218 |
chemzqm/wxapp.vim | Provides vim plugin support for WeChat Mini Program development | 415 |
apache/cordova-plugin-camera | Provides an API to access the device camera and photo library. | 966 |
mtnmunuklu/alterix | Converts detection rules and IOCs to be usable with a proprietary SIEM product | 15 |
mgeeky/stracciatella | A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code | 503 |
kschzt/gopro | A Node.js API for controlling and interacting with GoPro Hero 3 cameras. | 134 |
zu1k/beacon_hook_bypass_memscan | Bypassing memory scanning to evade detection by the Karbenz CASB (Content Awareness Security Platform) security solution | 24 |
bradley/iosswiftmetalcamera | An app demonstrating camera capture and processing using Metal in Swift | 115 |
shipcod3/mazda_getinfo | Demonstrates how a USB port can be exploited to access a car's infotainment system | 157 |