hacksider / aidialerLinks
A full stack app for interruptible, low-latency and near-human quality AI phone calls built from stitching LLMs, speech understanding tools, text-to-speech models, and Twilio’s phone API.
☆12Updated last year
Alternatives and similar repositories for aidialer
Users that are interested in aidialer are comparing it to the libraries listed below
Sorting:
- Generative AI phone call toolkit using Twilio Media Streams.☆16Updated 11 months ago
- make virus without coding☆12Updated 5 years ago
- Drop in a screenshot and convert it to clean code (HTML/Tailwind/React/Vue)☆26Updated last year
- Automatic | AI-generated captions - No API Key | Background Video | YouTube Shorts | TikTok☆22Updated 10 months ago
- BlueHunter is bluetooth device hacking framework☆22Updated last year
- simple ss7 & imsi catcher & kraken☆22Updated 3 years ago
- Silently logs and E-mails all incoming/outgoing calls and text messages while doubling up as a flashlight app. The app also has the abili…☆22Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Anubis 7.0☆27Updated 11 months ago
- Camera Hack bot - Powered by XPH4N70M☆20Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 5 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆22Updated 2 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆19Updated last year
- A Network Packet and Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network.☆11Updated 3 years ago
- ☆20Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Updated 3 years ago
- WH RAT V2 2022☆24Updated last year
- It's easy to use android botnet work without port forwarding, vps and android studio☆11Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆40Updated 3 years ago
- Python tools for ethical hacking☆43Updated 6 years ago
- Linux bash script automation for metasploit☆10Updated 9 years ago
- THE MASS BEAST XTOOL FOR HACKING CPANEL | SHELL | MAILER | RDP | SSH | SMTP USING PYTHON☆23Updated 5 years ago
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆43Updated 8 months ago
- XploitSPY is an Android Monitoring / Spying Tool Modified By DedSec☆33Updated 5 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆48Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆57Updated last year
- Fsociety Phishing Tool☆19Updated last year
- Automated hacking tool used to find leaked databases with 97.1% accuracy to grab emails along with their password from recent Pastebin up…☆37Updated last year