Pinned Repositories
e-konsulat
Automation script for poland visa appointment booking
EfficientSIPFuzzing
This is the source code of the paper "An Efficient Fuzzing Test Method For SIP Server".
p5-net-sip
Net::SIP Perl Module
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
sippts
Set of tools to audit SIP based VoIP Systems
sipshock
A scanner for SIP proxies vulnerable to Shellshock
siptest
Performs a sip registration and places a call into an echo test, plays audio, and verifies that the audio is echoed back clearly
sipvicious
SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems.
viproy-voipkit
VIPROY - VoIP Pen-Test Kit for Metasploit Framework
VoIP_SIP_AsteriskServer
Hack accounts and passwords on Asterisk servers
Elbal-code's Repositories
Elbal-code/p5-net-sip
Net::SIP Perl Module
Elbal-code/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
Elbal-code/sippts
Set of tools to audit SIP based VoIP Systems
Elbal-code/sipshock
A scanner for SIP proxies vulnerable to Shellshock
Elbal-code/siptest
Performs a sip registration and places a call into an echo test, plays audio, and verifies that the audio is echoed back clearly
Elbal-code/sipvicious
SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems.
Elbal-code/viproy-voipkit
VIPROY - VoIP Pen-Test Kit for Metasploit Framework
Elbal-code/VoIP_SIP_AsteriskServer
Hack accounts and passwords on Asterisk servers
Elbal-code/e-konsulat
Automation script for poland visa appointment booking
Elbal-code/EfficientSIPFuzzing
This is the source code of the paper "An Efficient Fuzzing Test Method For SIP Server".
Elbal-code/isip
Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.
Elbal-code/iwar
iWar - The intelligent war dialer.
Elbal-code/iwar2
iWar2 - The war dialer
Elbal-code/metasploit-framework
Metasploit Framework
Elbal-code/metasploit-framework-with-viproy
Metasploit Framework with Viproy installed.
Elbal-code/metassh
ssh session type for metasploit
Elbal-code/Mr.SIP
SIP-Based Audit and Attack Tool
Elbal-code/Nemea-Modules
Base modules of the Nemea system. This repository contains modules for export, replay, filtering, merging etc.
Elbal-code/Next_User
I wrote this simple program to change the user displayed during the Windows login screen for domain computers. This program was not digitally signed and does a lot of highly suspicious things, like modifying the registry (oh no!). On a deeper level it does need access to some pretty arcane windows configuration settings and will even try to reach out to Active Directory should it be on a domain. That said, the program nowadays gets flagged as a virus and I don't have the interest in resolving this (sorry, but it's a 6 year old project at this point). I often log into end user systems locally but I don't want my username displayed when I log out. Users are accustomed to their usernames being the default and will try to log in half a dozen times before realizing they're trying to login with the wrong account. This of course runs the risk of locking my admin account or my having to take a confused phone call. This program avoids that scenario (it has the added benefit of making me feel like an unseen IT ninja). It's now part of my routine when I log out. I keep it on a network share with a short path and it takes just seconds. System Requirements: Windows XP/Vista machines will need to have .NET 3.5, 7 & 8 have it by default. It requires being run with administrator rights as technically anything to do with the login screen is a system setting. Extra Info: This was adapted from a very simple batch script I made to accomplish the same task. The GUI program is more or less a fancy way to quickly change the same registry keys; its benefit is primarily the auto-populate function for speed. Auto-populate also prevents any typos that could represent an embarrassing IT fail. A user coming to work seeing their login displayed as MYCOMPANY\janesmoth instead of MYCOMPANY\janesmith would likely think their computer had been hacked. This is the original batch script if you prefer: @echo off cls set /p UserInput= Domain\User : reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI" /v LastLoggedOnSAMUser /t REG_SZ /d %UserInput% /f reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI" /v LastLoggedOnUser /t REG_SZ /d %UserInput% /f echo. pause exit
Elbal-code/proxenet
The ONLY hacker friendly proxy for webapp pentests.
Elbal-code/SIP-Firewall
Firewall for VoIP systems
Elbal-code/sipat
SIP Analysis and Testing tools
Elbal-code/sipp
The SIPp testing tool
Elbal-code/starter-workflows
Accelerating new GitHub Actions workflows
Elbal-code/Th3inspector
Th3Inspector 🕵️ Best Tool For Information Gathering 🔎
Elbal-code/voipwardialer
A Voip Wardialer for the phreaking of 2020
Elbal-code/vsaudit
VOIP Security Audit Framework