SMS spoofing is a technique where people replace or alter the originating mobile number of a text message with an alphanumeric text of their choice. In other words, people change their ID, phone number, or even both.
☆27Mar 16, 2024Updated 2 years ago
Alternatives and similar repositories for Sms-spoofer
Users that are interested in Sms-spoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to Spoof SMS from ANY number or shortcode!☆16Nov 21, 2022Updated 3 years ago
- Simple PHP Script for SMS Spoofing with Nexmo API☆17Mar 31, 2017Updated 9 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- A simple application that will repeatedly spam a phone number with spoofed phone numbers using FireRTC.☆27Jun 6, 2022Updated 3 years ago
- this is a repository for blooket hacks on my youtube channel, Dog-tp6be SUBSCIRBE!☆67May 18, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generate a fake "systeminfo.exe" binary in order to hide the presence of a VM☆16Jan 4, 2024Updated 2 years ago
- ☆17Mar 25, 2019Updated 7 years ago
- SentinelaNet é uma CNC (Comando e Controle) em Python, projetada para gerenciar um malware que realiza ataques de disparos em massa (DDoS…☆12Feb 16, 2026Updated 2 months ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- .Santet online santet-online Features : 1.netcat payload 2.fb group hijacking 3.sms-bomber 4.sms-spoof 5.dos attack Installation : $ apt …☆10Jan 1, 2021Updated 5 years ago
- Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions☆20Apr 14, 2022Updated 4 years ago
- ☆14Sep 23, 2025Updated 7 months ago
- Create macOS installation media outside MAS☆23Sep 27, 2025Updated 7 months ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A free open source alternative Porn front-end focused on privacy.☆16May 22, 2025Updated 11 months ago
- A script for the MPV media player that allows you to view PDF files☆13Nov 18, 2018Updated 7 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- ☆29Feb 13, 2020Updated 6 years ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆14May 15, 2021Updated 4 years ago
- unlock iCloud remotely via IMEI and model type clean devices second unlock iCloud account from any device remotely via IMEI and model typ…☆16Oct 23, 2017Updated 8 years ago
- Capture OTP & SMS codes in seconds directly from your private telegram API bot by simply entering the target phone number and website lin…☆49May 26, 2022Updated 3 years ago
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆16Jan 7, 2026Updated 4 months ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆37Jan 14, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Xposed module fake system information sucu as imei ,location☆13Aug 7, 2016Updated 9 years ago
- A curated list of awesome iOS UI/UX libraries. With repository stars⭐ and forks🍴☆12Updated this week
- Forensic analysis tool useful in backwards computing information from next-generation sequencing data.☆11May 4, 2026Updated last week
- Reference of Vehicle Security。☆12Aug 13, 2021Updated 4 years ago
- ☆11Oct 9, 2024Updated last year
- local e=(function(n,e)return(n~=e);end)local e=(function(n,e)return(n>=e);end)local V=(function(n,e)return(n>e);end)local G=(function(n,e…☆14Jan 2, 2022Updated 4 years ago
- Repair imei, Wifi , BT , SN of spreadtrum device☆13Feb 15, 2023Updated 3 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Dec 11, 2022Updated 3 years ago
- GHunt Research & Development Toolkit☆17Dec 3, 2022Updated 3 years ago
- A demonstration on how to authenticate yourself against the sipgate REST API using HTTP Basic Auth, which returns basic account informati…☆14May 21, 2024Updated last year
- 3D Drum machine using Three.js☆12Jul 20, 2020Updated 5 years ago
- Replies to all OBD2 requests with dummy data☆16Dec 10, 2023Updated 2 years ago
- A collection of utilities to reverse engineer ESP8266 firmware☆10Updated this week
- A loader and analyzer for ESP8266 firmware☆15Feb 20, 2026Updated 2 months ago