Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.
☆27Sep 20, 2020Updated 5 years ago
Alternatives and similar repositories for calleridspoofer
Users that are interested in calleridspoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Zero-dependency MCP server implementation.☆75Mar 27, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆24Nov 23, 2022Updated 3 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆46Jun 23, 2025Updated 10 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆87Aug 5, 2025Updated 9 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated last year
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 5 months ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- ☆50Jun 4, 2025Updated 11 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆88Sep 2, 2025Updated 8 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆147Mar 9, 2024Updated 2 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆263Feb 2, 2026Updated 3 months ago
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆160Mar 26, 2025Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Jun 27, 2023Updated 2 years ago
- ☆39Dec 4, 2025Updated 5 months ago
- ☆39Sep 25, 2023Updated 2 years ago
- Beacon Object File & C# project to check LDAP signing☆202Aug 7, 2024Updated last year
- ☆23Jun 9, 2024Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆314Sep 10, 2020Updated 5 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆83Updated this week
- Bypass Detection By Randomising ROR13 API Hashes☆141Feb 24, 2022Updated 4 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- Python module for running BOFs☆80Nov 28, 2025Updated 5 months ago