pentesteracademy / voipshark
VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypted SRTP stream, perform macro analysis, generate summary specific to VoIP traffic/nodes and export calls/SMS/DTMF in popular user friendly file formats.
☆84Updated 5 years ago
Alternatives and similar repositories for voipshark:
Users that are interested in voipshark are comparing it to the libraries listed below
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- A "SIP Torture" (RFC 4475) testing framework.☆64Updated last year
- WireBug is a toolset for Voice-over-IP penetration testing☆170Updated 3 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆101Updated 5 years ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- SIP-Based Audit and Attack Tool☆398Updated last year
- Wireshark Profiles for SS7, Diameter & GTP☆24Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 5 months ago
- Security advisories published by Enable Security☆40Updated 9 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- Legba recipes.☆48Updated 7 months ago
- Clone network interface from one host as a tap interface on another host☆58Updated 4 years ago
- Set of tools to audit SIP based VoIP Systems☆477Updated 4 months ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆48Updated 4 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆38Updated 8 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- VoIP honeypot system☆19Updated last year
- Automated 802.1x Bypass☆84Updated 5 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- TCAP (MAP/CAP) transaction tracking for pcap files☆27Updated 10 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- sudo-parser is a tool to audit complex sudoers files☆17Updated 2 years ago
- DES Rainbow Table Online Phase☆25Updated 7 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆75Updated 3 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆96Updated 4 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- The Nmap Scanner for Telco☆157Updated 6 years ago
- ☆12Updated 3 years ago