☎️ Original open source call flooder using Twilio's API.
☆347Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for soup
Users that are interested in soup are comparing it to the libraries listed below
Sorting:
- Asterisk Call Flooder☆25Jul 15, 2019Updated 6 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 10 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 10 years ago
- SPAM ANDROID AS WELL AS IPHONE USERS WITH CALL FLOODING........☆16Sep 10, 2020Updated 5 years ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Bomb any SMS number with messages using existing E-Mail account.☆73Oct 1, 2020Updated 5 years ago
- Massive arsenal of hacker tools...☆79Oct 30, 2017Updated 8 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- ☆23Mar 27, 2019Updated 6 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- Asterisk Debian packaging and patches for Wazo☆12Feb 23, 2026Updated 2 weeks ago
- Enter the target number and run the script. The target will receive a phone call every 3 seconds.☆14Jun 24, 2017Updated 8 years ago
- SIP-Based DDoS Defense Tool☆15Sep 6, 2018Updated 7 years ago
- Simple Freeswitch desktop management application☆11Jan 22, 2017Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- An advanced Bluetooth scanner for the ESP32 CYD device that monitors nearby Bluetooth devices and alerts you when new devices come within…☆17Sep 22, 2024Updated last year
- Build IVR, run voice campaign, with machine detection, speech recognition and much more. Integrated support for twilio api. Asterisk inte…☆14Apr 21, 2023Updated 2 years ago
- YOURLS URL preview plugin with image caching powered by PhantomJS☆12Mar 14, 2021Updated 4 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- One button to close any overlay on any website☆11Mar 20, 2022Updated 3 years ago
- ☆11Jan 3, 2024Updated 2 years ago
- Allows external systems or MCUs to connect BLE (CC2540) using HCI as BLE Central Role☆11Jul 1, 2015Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- IP Phone – lightweight SIP softphone for Windows☆84Sep 3, 2024Updated last year
- Platform independent Near Field Communication (NFC) library☆28Jan 22, 2021Updated 5 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 3 years ago
- hacking tools package☆12May 29, 2025Updated 9 months ago
- Extrinsic noise is everywhere. Using a microphone and a Voltage controlled crystall oscillator, an RF circuit was built to jam cellular c…☆16May 5, 2019Updated 6 years ago