Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.
☆27Sep 20, 2020Updated 5 years ago
Alternatives and similar repositories for calleridspoofer
Users that are interested in calleridspoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Call API from Zspoof is a tool which is used for spoofing calls. This tool lets you to call anyone by changing callerid.☆17Sep 10, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Zero-dependency MCP server implementation.☆74Updated this week
- THIS REPOSITORY ONLY MADE FOR PROVIDING SPOOFING CALL AND EMAIL☆12Oct 1, 2023Updated 2 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- CallerID spoofing script using PHPAGI☆92Jun 17, 2010Updated 15 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- dcsync bof☆46Feb 13, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sistema hardware basado en Arduino para detectar Rubber Duckies, evitando su conexión física al PC y permitiendo conectar pendrives o tec…☆12Jul 28, 2022Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Android application penetration testing for the masses.☆14Apr 12, 2019Updated 6 years ago
- ☆12May 13, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- A guide to call spoofing☆37May 21, 2021Updated 4 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆24Mar 19, 2026Updated last week
- FireRTC Caller ID Changer allows you to easily change your Caller ID in the free online phone software "FireRTC".☆15Sep 9, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆87Aug 5, 2025Updated 7 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- ☆50Jun 4, 2025Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆89Sep 2, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Determine if the WebClient Service (WebDAV) is running on a remote system☆144Mar 9, 2024Updated 2 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- Make sure your remote stays up to date with changes to local code☆17Jun 26, 2020Updated 5 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated last month
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆159Mar 26, 2025Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago