Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase
☆34Jul 5, 2022Updated 3 years ago
Alternatives and similar repositories for voip-caller
Users that are interested in voip-caller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is Camera Dorks for your default browser by 1vere$k.☆18May 24, 2022Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- ☆14Mar 7, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆28Nov 8, 2021Updated 4 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆242Oct 14, 2024Updated last year
- Botticelli is an open-source .NET Core framework for building universal chatbots. It enables seamless integration with databases, queue b…☆14Mar 14, 2026Updated last week
- ☆27Feb 3, 2026Updated last month
- ☆20Dec 29, 2024Updated last year
- ☆26Sep 7, 2024Updated last year
- HTA Visual Basic script for remote shell on windows machines☆23Sep 4, 2018Updated 7 years ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Convert any binary data to a PNG image file and vice versa.☆135Dec 25, 2023Updated 2 years ago
- ☆53Apr 19, 2023Updated 2 years ago
- The Tragedy of the CO₂mmons☆10Feb 7, 2020Updated 6 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bot verifies a mobile phone number activity status by HLR-lookup. The request is processed by the communication operator without reaching…☆16Jan 25, 2022Updated 4 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- A Powerful Email Harvester Tool By OCEAN OF ANYTHING☆17Nov 20, 2025Updated 4 months ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆40Jul 5, 2023Updated 2 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…