no2pencil / asterisk-flood-scrip
The purpose is to flood scam call centers. If you can't already do this manually, this script won't be much use to you.
☆9Updated 5 months ago
Alternatives and similar repositories for asterisk-flood-scrip:
Users that are interested in asterisk-flood-scrip are comparing it to the libraries listed below
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆30Updated 7 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- simple script to pwn android phone with physical access☆24Updated 6 years ago
- WP Grab Info v2☆62Updated 7 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 5 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- wifi attacks suite☆59Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- Refluxion -- MITM WPA attacks tool☆34Updated 4 years ago
- Handshake cracker☆51Updated last year
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆48Updated 7 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆25Updated 6 years ago
- WiFi-Jammer/DoS toolset☆61Updated 4 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆31Updated 9 years ago
- ARP spoof then session jack within your browser☆29Updated 11 years ago
- BlackArch Linux Keyring☆21Updated 6 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆46Updated last year
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Evil Twin Attack Bash script☆13Updated 9 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆86Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Skype Ip Resolver☆20Updated 10 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago