SMS spoofing is a technique where people replace or alter the originating mobile number of a text message with an alphanumeric text of their choice. In other words, people change their ID, phone number, or even both.
☆27Mar 16, 2024Updated 2 years ago
Alternatives and similar repositories for Sms-spoofer
Users that are interested in Sms-spoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Send text messages using a spoofed phone number☆25Apr 26, 2019Updated 6 years ago
- Tool to Spoof SMS from ANY number or shortcode!☆16Nov 21, 2022Updated 3 years ago
- Email Spoofing Tool is a Python Script that helps to Spoof Email Addresses, The mail spoofed by this tool lands 100% on inbox and the too…☆14Mar 16, 2024Updated 2 years ago
- Simple PHP Script for SMS Spoofing with Nexmo API☆17Mar 31, 2017Updated 9 years ago
- thelinuxchoice/blackeye☆12Jul 26, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A simple application that will repeatedly spam a phone number with spoofed phone numbers using FireRTC.☆27Jun 6, 2022Updated 3 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions☆20Apr 14, 2022Updated 4 years ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- A free open source alternative Porn front-end focused on privacy.☆16May 22, 2025Updated 10 months ago
- A script for the MPV media player that allows you to view PDF files☆13Nov 18, 2018Updated 7 years ago
- ☆14Feb 9, 2020Updated 6 years ago
- ☆29Feb 13, 2020Updated 6 years ago
- Exploit for CVE-2021-27342 vulnerability (telnet authentication brute-force protection bypass)☆14May 15, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Social media AI bot using computer vision to imitate human behaviors. Final project for Harvard Advance Python CSCI E-29 Fall 2020. Recei…☆10Sep 19, 2024Updated last year
- unlock iCloud remotely via IMEI and model type clean devices second unlock iCloud account from any device remotely via IMEI and model typ…☆16Oct 23, 2017Updated 8 years ago
- Capture OTP & SMS codes in seconds directly from your private telegram API bot by simply entering the target phone number and website lin…☆49May 26, 2022Updated 3 years ago
- CRC Tool Kit☆18Oct 5, 2012Updated 13 years ago
- The source code of iDecryptIt - an IPSW firmware decryption tool☆17Mar 11, 2026Updated last month
- The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc☆10Apr 28, 2025Updated 11 months ago
- A curated list of awesome iOS UI/UX libraries. With repository stars⭐ and forks🍴☆12Updated this week
- URLs very strong obfuscation tool (can be used in requests too)☆18Oct 3, 2024Updated last year
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Restores firmware and filesystem to iPhone/iPod Touch☆11Jun 7, 2010Updated 15 years ago
- A reactive editor for algorithms and ASCII art. Recho Notebook introduces a plain code format for notebooks, echoing outputs inline for i…☆25Mar 24, 2026Updated 3 weeks ago
- ☆11Oct 9, 2024Updated last year
- local e=(function(n,e)return(n~=e);end)local e=(function(n,e)return(n>=e);end)local V=(function(n,e)return(n>e);end)local G=(function(n,e…☆14Jan 2, 2022Updated 4 years ago
- Repair imei, Wifi , BT , SN of spreadtrum device☆13Feb 15, 2023Updated 3 years ago
- 🔮 Uncover parts of mutuals followers of an instagram private account☆17Mar 31, 2022Updated 4 years ago
- ☆13Dec 11, 2022Updated 3 years ago
- Implementation of Kuznechik cipher Russian standard GOST R 3412-2015 - 128 bit block size / 256 bit key - 8,16, 32, 64, 128-bit x86 versi…☆10Jun 27, 2016Updated 9 years ago
- GHunt Research & Development Toolkit☆17Dec 3, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python support for Flipper Zero (smaller edition)☆12Nov 20, 2024Updated last year
- This program loads and shows the resources of binary files such as EXE and DLL☆17Jul 6, 2020Updated 5 years ago
- Import custom queries into BloodHound CE from a legacy BloodHound JSON file.☆10Mar 22, 2024Updated 2 years ago
- A demonstration on how to authenticate yourself against the sipgate REST API using HTTP Basic Auth, which returns basic account informati…☆14May 21, 2024Updated last year
- A Python-based interface to the Saleae Logic/Logic16 Device SDK☆19Jul 11, 2014Updated 11 years ago
- Replies to all OBD2 requests with dummy data☆15Dec 10, 2023Updated 2 years ago
- A collection of utilities to reverse engineer ESP8266 firmware☆10Mar 23, 2020Updated 6 years ago