{"id":13540147,"url":"https://github.com/enablesecurity/sipvicious","last_synced_at":"2025-05-14T07:09:03.897Z","repository":{"id":28615010,"uuid":"32133566","full_name":"EnableSecurity/sipvicious","owner":"EnableSecurity","description":"SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.","archived":false,"fork":false,"pushed_at":"2024-12-03T10:02:48.000Z","size":887,"stargazers_count":946,"open_issues_count":0,"forks_count":158,"subscribers_count":43,"default_branch":"master","last_synced_at":"2025-05-10T07:53:34.746Z","etag":null,"topics":["audit-sip","hacking-tools","password-cracker","security","security-tools","sip","svcrack","svcrash","svmap","svwar","voip","war-dial"],"latest_commit_sha":null,"homepage":"https://www.enablesecurity.com/sipvicious/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EnableSecurity.png","metadata":{"files":{"readme":"README.md","changelog":"Changelog","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2015-03-13T06:11:55.000Z","updated_at":"2025-05-07T06:19:02.000Z","dependencies_parsed_at":"2024-12-28T07:00:21.668Z","dependency_job_id":"f34b3860-927f-438a-8806-3a850bf4152b","html_url":"https://github.com/EnableSecurity/sipvicious","commit_stats":{"total_commits":433,"total_committers":7,"mean_commits":"61.857142857142854","dds":"0.24480369515011546","last_synced_commit":"20fd8513bbe7c3bed99e48e9fc20f149e8d04b54"},"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EnableSecurity%2Fsipvicious","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EnableSecurity%2Fsipvicious/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EnableSecurity%2Fsipvicious/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EnableSecurity%2Fsipvicious/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EnableSecurity","download_url":"https://codeload.github.com/EnableSecurity/sipvicious/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254092776,"owners_count":22013290,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["audit-sip","hacking-tools","password-cracker","security","security-tools","sip","svcrack","svcrash","svmap","svwar","voip","war-dial"],"created_at":"2024-08-01T09:01:41.373Z","updated_at":"2025-05-14T07:08:58.887Z","avatar_url":"https://github.com/EnableSecurity.png","language":"Python","readme":"# Welcome to SIPVicious OSS security tools\n\n![SIPVicious mascot](https://repository-images.githubusercontent.com/32133566/55b41300-12d9-11eb-89d8-58f60930e3fa)\n\nSIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.\n\nTo get started read the following:\n\n- [Getting started on the Wiki](https://github.com/enablesecurity/sipvicious/wiki/Getting-Started)\n- Communication Breakdown blog: [Attacking a real VoIP System with SIPVicious OSS](https://www.rtcsec.com/2020/06/02-attacking-voip-system-with-sipvicious/).\n\nFor usage help make use of `-h` or `--help` switch.\n\n## A note to vendors and service providers\n\nIf you are looking for professional VoIP and WebRTC penetration testing services, please check out our offerings at [Enable Security](https://www.enablesecurity.com/).\n\n## The tools\n\nThe SIPVicious OSS toolset consists of the following tools:\n\n- svmap\n- svwar\n- svcrack\n- svreport\n- svcrash\n\n### svmap\n\n\tthis is a sip scanner. When launched against\n\tranges of ip address space, it will identify any SIP servers \n\twhich it finds on the way. Also has the option to scan hosts \n\ton ranges of ports.\n\n\tUsage: \u003chttps://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage\u003e\n\n### svwar\n\n\tidentifies working extension lines on a PBX. A working \n\textension is one that can be registered. \n\tAlso tells you if the extension line requires authentication or not. \n\n\tUsage: \u003chttps://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage\u003e\n\n### svcrack\n\t\n\ta password cracker making use of digest authentication. \n\tIt is able to crack passwords on both registrar servers and proxy \n\tservers. Current cracking modes are either numeric ranges or\n\twords from dictionary files.\n\n\tUsage: \u003chttps://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage\u003e\n\n### svreport\n\n\table to manage sessions created by the rest of the tools\n\tand export to pdf, xml, csv and plain text.\n\n\tUsage: \u003chttps://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage\u003e\n\n### svcrash\n\t\n\tresponds to svwar and svcrack SIP messages with a message that\n\tcauses old versions to crash. \n\n\tUsage: \u003chttps://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ\u003e\n\n\n## Installation\n\nPlease refer to the [installation documentation](https://github.com/EnableSecurity/sipvicious/wiki/Basics#installation).\n\n## Further information\n\nCheck out the [wiki](https://github.com/enablesecurity/sipvicious/wiki) for documentation.\n\n","funding_links":[],"categories":["\u003ca id=\"df8a5514775570707cce56bb36ca32c8\"\u003e\u003c/a\u003e审计\u0026\u0026安全审计\u0026\u0026代码审计"],"sub_categories":["\u003ca id=\"34569a6fdce10845eae5fbb029cd8dfa\"\u003e\u003c/a\u003e代码审计"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fenablesecurity%2Fsipvicious","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fenablesecurity%2Fsipvicious","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fenablesecurity%2Fsipvicious/lists"}