CamJacking v2.0 – Simulating Real-World Camera Phishing for Security Awareness

CamJacking is an enterprise-grade security awareness training framework built to simulate realistic phishing attacks that abuse webcam permissions. Designed for ethical hackers, red teamers, and security teams, CamJacking helps organizations understand how easily users can be tricked into granting camera access β€” and how to defend against it.

🎯 What is CamJacking?

CamJacking creates realistic phishing pages that request camera access under legitimate-looking scenarios (video calls, verification pages, meeting joins, etc). Once permission is granted, the framework captures user behavior and logs activity for security awareness training and red team simulations.

Unlike simple PoC tools, CamJacking v2.0 includes a full Admin Dashboard, campaign management, Telegram alerts, and template automation β€” making it suitable for enterprise security training programs.

πŸš€ Key Features in v2.0

  • πŸ“Έ Camera Phishing Simulation – Realistic camera permission abuse scenarios
  • πŸ–₯️ Admin Dashboard (GUI Panel) – Manage campaigns, view logs, and monitor targets
  • πŸ€– Telegram Bot Integration – Receive captured alerts in real time
  • πŸ”„ Auto Template Updates – Fetch latest phishing templates automatically
  • πŸ—‚οΈ Campaign History & Logs – Track user activity and behavior
  • 🌐 Public URL Generation – Automatic internet exposure using Cloudflare tunnels

⚑ Step 0: install camjacking tool


   npm install camjacking -g
  

You will be greeted with the interactive CLI main menu:



   β”Œβ”€β”€(Hacker@linux)-[~]
   └─$ camjacking                                     


                                                                           v2.0

    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆ   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
   β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ•β• β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
   β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•     β•šβ•β• β•šβ•β•β•β•β• β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•β•β• β•šβ•β•β•β•β•β•
                                                            Author: @karthithehacker
                                                            Website: karthithehacker.com

   Main Menu
   ┏━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━┓
   ┃ No. ┃ Option                   ┃
   ┑━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━━━━┩
   β”‚ 1   β”‚ 🎯 Create new Target     β”‚
   β”‚ 2   β”‚ πŸ“‚ Select Existing Targetβ”‚
   β”‚ 0   β”‚ ❌ Quit                  β”‚
   β””β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
  

🧭 Step 1: Create a New Target

  • Select 1 – Create new Target
  • Enter a target name (e.g., Bob)

🎨 Step 2: Select a Template

Choose a phishing template such as Instagram, Google Meet, TikTok, or Telegram:




                                                                           v2.0

    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆ   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
   β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ•β• β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
   β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•     β•šβ•β• β•šβ•β•β•β•β• β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•β•β• β•šβ•β•β•β•β•β•
                                                            Author: @karthithehacker
                                                            Website: karthithehacker.com
   Select Template
   ┏━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━┓
   ┃ No. ┃ Templates             ┃
   ┑━━━━━╇━━━━━━━━━━━━━━━━━━━━━━━┩
   β”‚ 1   β”‚ GoogleMeet            β”‚
   β”‚ 2   β”‚ TikTok                β”‚
   β”‚ 3   β”‚ Instagram             β”‚
   β”‚ 4   β”‚ InstagramCamera       β”‚
   β”‚ 5   β”‚ Instagram_VideoCall   β”‚
   β”‚ 6   β”‚ TelegramCamera        β”‚
   β””β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
  

πŸš€ Step 3: Server Started

Once the template is selected, CamJacking automatically starts the phishing server and generates both local and public URLs:

  • πŸ”— Local URL – For testing on your machine
  • 🌍 Public URL – Share this link during awareness simulations
  • πŸ–₯️ Admin Panel – Monitor logs and captured data

πŸ“Έ Step 4: Capture Logs & Media

When a user opens the target URL, activity is logged automatically:



                                                                           v2.0

    β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ–ˆβ•—     β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•‘ β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β•
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—
   β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆ   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘
   β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ•β• β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•
   β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•     β•šβ•β• β•šβ•β•β•β•β• β•šβ•β•  β•šβ•β• β•šβ•β•β•β•β•β•β•šβ•β•  β•šβ•β•β•šβ•β•β•šβ•β•  β•šβ•β•β•β• β•šβ•β•β•β•β•β•
                                                            Author: @karthithehacker
                                                            Website: karthithehacker.com

   [+] User opened url /?uuid=xxxx
   [+] IP Address: xxx.xxx.xxx.xxx
   [+] User-Agent: Browser Info
   [+] Log Timestamp: 2026-02-24T19:44:21Z
   [+] Saved file: ~/camjacking-photos/<TARGET-UUID>/image.jpg
  

All captured images are stored in:
~/camjacking-photos/<TARGET-UUID>/

πŸ“Š Admin Dashboard Monitoring

Access the Admin Dashboard to view logs, targets, and captured media:
πŸ‘‰ https://cappriciosec.com/camjacking

β›” Stop the Server

Press x in the terminal at any time to stop the running server.

This will launch the interactive CLI menu where you can create targets, select phishing templates, and start campaigns.

The dashboard allows you to:

  • View live activity
  • Monitor captured logs
  • Manage Telegram Chat ID
  • Review campaign history

πŸ€– Configure Telegram Alerts

Connect your Telegram bot to receive real-time alerts whenever a user opens the phishing page or grants camera permissions.

  • Open Telegram and search @CappricioSecuritiesTools_bot
  • Click Start and get your Chat ID
  • Paste the Chat ID inside the Admin Dashboard profile settings

🎨 Custom Phishing Templates

CamJacking automatically clones the official template repository and loads phishing templates dynamically. You can also add your own custom HTML/CSS designs without writing any camera code β€” the framework injects camera logic for you.

🎯 Real-World Use Cases

  • πŸ‘¨β€πŸ« Security Awareness Training – Teach employees about camera permission risks
  • πŸ§ͺ Red Team Simulations – Measure human-layer attack surface
  • 🏒 Enterprise Phishing Drills – Run controlled phishing campaigns
  • πŸŽ“ Cybersecurity Training Labs – Hands-on learning for students and professionals

⚠️ Legal & Ethical Disclaimer

CamJacking is strictly intended for authorized security training, educational purposes, and controlled lab environments. Any unauthorized use against real users or systems without explicit permission may be illegal.

πŸ”— Project Links

GitHub Repository: https://github.com/Cappricio-Securities/camjacking

🧠 Final Thoughts

CamJacking v2.0 goes beyond a simple phishing PoC. It is a full-fledged security awareness framework that helps organizations measure human risk, train employees, and improve their overall security posture. If your goal is to simulate real-world social engineering attacks in a controlled, ethical way β€” CamJacking is built for exactly that.

Thanks for reading! If you found this useful, feel free to share it with your fellow hackers. Stay safe and think before you click! πŸ’»πŸ”’