0xInfection / SIPTorchLinks
A "SIP Torture" (RFC 4475) testing framework.
☆65Updated 2 years ago
Alternatives and similar repositories for SIPTorch
Users that are interested in SIPTorch are comparing it to the libraries listed below
Sorting:
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆50Updated 4 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- Responder for Python3☆100Updated 6 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆171Updated 3 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- API testing tool written with Python☆56Updated 8 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 11 months ago
- Advanced web server fingerprinting for Nmap☆128Updated 7 years ago
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆87Updated 5 years ago
- A program to map out SPF and DKIM records for a large number of domains☆38Updated 10 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- DNS File EXfiltration☆46Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- ☆93Updated 2 years ago
- Brute-force Cisco SSL VPN☆57Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago