☎️ Original open source call flooder using Twilio's API.
☆349Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for soup
Users that are interested in soup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source call flooder using Twilio API.☆24Apr 15, 2026Updated 3 weeks ago
- Asterisk Call Flooder☆25Jul 15, 2019Updated 6 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆16Sep 10, 2020Updated 5 years ago
- Bomb any SMS number with messages using existing E-Mail account.☆76Oct 1, 2020Updated 5 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- Massive arsenal of hacker tools...☆82Oct 30, 2017Updated 8 years ago
- Android trojan streamer client jar☆17Sep 11, 2016Updated 9 years ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- For scambaiters to have some fun☆14Mar 6, 2017Updated 9 years ago
- A server which allows you to route tasks to agents.☆21Updated this week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Dec 17, 2015Updated 10 years ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 5 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- This is a schematic for a cell phone jammer that works for the frequency band GSM 1900. It was part of my master's thesis at ITP/NYU. See…☆48Oct 21, 2014Updated 11 years ago
- MIRAI botnet in python3☆19Jun 18, 2019Updated 6 years ago
- hacking tools package☆11May 29, 2025Updated 11 months ago
- Alexa Skill to interact with ChatGPT☆15Mar 23, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- USBNinja steals all Wifi SSID's and passwords that a computer has been connected to and sends them to a mail by choice. Works on Windows …☆21Nov 26, 2019Updated 6 years ago
- Python Backdoor Obfusctor, Encrypter and Encoder☆18Nov 5, 2018Updated 7 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Nov 4, 2018Updated 7 years ago
- The EVIL EMAIL/SMS BOMBER is made for research and testing purposes only. Prank your friends. EVIL EMAIL/SMS BOMBER can send bulk mail …☆51Nov 9, 2021Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Get your USB Rubber Ducky up and running faster☆46Nov 18, 2017Updated 8 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- Send Bulk fake poll votes with your accounts by this tool.☆12Oct 14, 2025Updated 6 months ago
- Open source software radio 3GPP LTE UE☆10Apr 17, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Use encoder feedback to try to glean the internal workings of a combination safe.☆40Jul 26, 2017Updated 8 years ago
- WiFi-Jammer/DoS toolset☆63Jun 8, 2020Updated 5 years ago
- A Voip Wardialer for the phreaking of 2020☆57Jun 27, 2024Updated last year
- Simple Freeswitch desktop management application☆11Jan 22, 2017Updated 9 years ago
- CharityWifi: Integrating a charitable donation into wireless hotspot captive portal.☆31Nov 5, 2012Updated 13 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- A simple script to generate a hidden url for social engineering.☆123Aug 11, 2020Updated 5 years ago