Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.
☆27Sep 20, 2020Updated 5 years ago
Alternatives and similar repositories for calleridspoofer
Users that are interested in calleridspoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Call API from Zspoof is a tool which is used for spoofing calls. This tool lets you to call anyone by changing callerid.☆17Sep 10, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Reverse Caller Id using TrueCaller☆73Jun 7, 2018Updated 7 years ago
- Zero-dependency MCP server implementation.☆74Mar 27, 2026Updated 3 weeks ago
- THIS REPOSITORY ONLY MADE FOR PROVIDING SPOOFING CALL AND EMAIL☆12Oct 1, 2023Updated 2 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- CallerID spoofing script using PHPAGI☆93Jun 17, 2010Updated 15 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- dcsync bof☆51Feb 13, 2026Updated 2 months ago
- Sistema hardware basado en Arduino para detectar Rubber Duckies, evitando su conexión física al PC y permitiendo conectar pendrives o tec…☆12Jul 28, 2022Updated 3 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Android application penetration testing for the masses.☆14Apr 12, 2019Updated 7 years ago
- ☆12May 13, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- A guide to call spoofing☆37May 21, 2021Updated 4 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- FireRTC Caller ID Changer allows you to easily change your Caller ID in the free online phone software "FireRTC".☆15Sep 9, 2017Updated 8 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆87Aug 5, 2025Updated 8 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 4 months ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- ☆50Jun 4, 2025Updated 10 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆88Sep 2, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Determine if the WebClient Service (WebDAV) is running on a remote system☆145Mar 9, 2024Updated 2 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- Make sure your remote stays up to date with changes to local code☆17Jun 26, 2020Updated 5 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆264Feb 2, 2026Updated 2 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆160Mar 26, 2025Updated last year
- ☆38Dec 4, 2025Updated 4 months ago