Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Real-Time Communications
  3. SIPVicious

SIPVicious

NOASSERTIONPythonv0.3.6

A VoIP security testing toolset for auditing SIP-based systems through scanning, enumeration, and password cracking.

Visit WebsiteGitHubGitHub
1.1k stars179 forks0 contributors

What is SIPVicious?

SIPVicious OSS is a VoIP security testing toolset that audits SIP-based systems by identifying servers, enumerating extensions, and cracking passwords. It simulates hacking attacks against PBX systems to help security teams and developers uncover vulnerabilities in VoIP infrastructure.

Target Audience

Security professionals, penetration testers, QA engineers, and developers working with or responsible for securing SIP-based VoIP systems and applications.

Value Proposition

It provides a comprehensive, open-source suite of tools specifically designed for VoIP security testing, offering capabilities like scanning, enumeration, and password cracking that are essential for thorough vulnerability assessments in SIP environments.

Overview

SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks against PBX systems especially through identification, scanning, extension enumeration and password cracking.

Use Cases

Best For

  • Identifying active SIP servers and open ports in a network
  • Enumerating SIP extensions on a PBX to find working lines
  • Cracking passwords on SIP registrar or proxy servers
  • Simulating VoIP hacking attacks for security training
  • Auditing VoIP systems for authentication vulnerabilities
  • Exporting security test results to multiple formats for reporting

Not Ideal For

  • Teams requiring graphical user interfaces for security testing
  • Projects that need real-time, continuous monitoring of VoIP systems
  • Organizations auditing non-SIP based communication protocols

Pros & Cons

Pros

Comprehensive VoIP Toolset

Includes dedicated tools like svmap for server scanning, svwar for extension enumeration, and svcrack for password cracking, covering key VoIP security audit tasks as outlined in the tools section.

Real-World Attack Simulation

Designed to simulate actual hacking attacks on VoIP systems, with a linked blog post demonstrating practical use in attacking a real VoIP system for security hardening.

Multi-Format Reporting

svreport allows exporting results to PDF, XML, CSV, and plain text, facilitating easy documentation and sharing of audit findings across teams.

IPv6 Protocol Support

Tools support IPv6 targets with specific syntax, such as using -6 flags in svmap and svwar, ensuring compatibility with modern network environments as detailed in the IPv6 section.

Cons

Command-Line Only Interface

All tools operate via terminal commands with switches like -h, which may be less intuitive for users preferring graphical interfaces or with limited CLI experience.

Fragmented Documentation

Usage instructions are split across a wiki and individual tool pages, potentially making it harder for new users to find consolidated, beginner-friendly guidance.

Ethical and Legal Risks

Powerful for penetration testing but requires strict ethical use, as misuse on unauthorized systems could lead to legal issues, with the README noting professional services for vendors.

Frequently Asked Questions

Quick Stats

Stars1,071
Forks179
Contributors0
Open Issues0
Last commit11 days ago
CreatedSince 2015

Tags

#sip#network-scanning#penetration-testing#security#voip#security-tools#password-cracking#authentication-testing

Links & Resources

Website

Included in

Real-Time Communications471
Auto-fetched 6 hours ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub