iveresk / voip-caller

Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

VoIP Caller by 1vere$k

This is simple 5060 port exploit that calls to a receiver VoIP device with pre-defined phrase.
The app establishes a TCP connection and write a VoIP Payload with the INVITE method which initiates a call with pre-defined "caller-name" which is our phrase.

Usage

Application

1. git clone https://github.com/iveresk/voip-caller.git
2. cd voip-caller
3. go build -o /voip-caller
4. ./voip-caller -t <target_url or file_name> [OPTIONAL] -d false -s <YOUR_PHRASE>

- t - target URL or filename
- d - debug {true, false} flag which enables or disables logs
- s - is your "caller name" which is your phrase

Docker with pre-defined 20k ruzzian VoIP devices.

docker run -d masterroot/voip-caller

Have fun with ruzzland-terrorist-state VoIP devices :D

Example

Zelensky Calling. We Will Find You!

RUSSIAN WARSHIP GO FRAK YOURSELF!

Russian Warship Go F*ck Yourself

Contact

You are free to contact me via Keybase for any details.

About

Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase

License:MIT License


Languages

Language:Go 85.9%Language:Dockerfile 14.1%