SIPVicious Tool Suite v0.2.6 – SIP/VoIP Security Auditing Tool

Keep on Guard!

SIPVicious suite is a set of tools that can be used to audit SIP based VoIP systems. Why the name? Because the tools are not exactly the nicest thing on earth next to a SIP device. And the play on the sound seems to work. As an extra bonus, it rhymes with the name of Sex Pistol’s bass player.

It’s been a while since we wrote about SIPVicious, way back when it first came out in 2008 – SIPVicious v0.2.3 – VoIP/SIP Auditing Toolkit. It’s come a fair way since v0.2.3 so I thought it’s about time for an update (although v0.2.6 has been out since 2010), you can view the full ChangeLog here.

It currently consists of five tools:

  • svmap – this is a sip scanner. Lists SIP devices found on an IP range
  • svwar – identifies active extensions on a PBX
  • svcrack – an online password cracker for SIP PBX
  • svreport – manages sessions and exports reports to various formats
  • svcrash – attempts to stop unauthorized svwar and svcrack scans


Python – SIPVicious works on any system that supports python 2.4 or greater.

There’s a good blog post covering the new stuff here too, mainly svcrash:

How to crash SIPVicious – introducing

You can download SIPVicious v0.2.6 here:

Or read more here.

Posted in: Hacking Tools, Network Hacking

, , , , , , , , , , , , , , , , ,

Recent in Hacking Tools:
- Github Dorks – Github Security Scanning Tool
- scanless – A Public Port Scan Scraper
- Ubertooth – Open Source Bluetooth Sniffer

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,020,637 views
- Brutus Password Cracker – Download AET2 - 1,592,098 views
- wwwhack 1.9 – Download Web Hacking Tool - 704,407 views

One Response to SIPVicious Tool Suite v0.2.6 – SIP/VoIP Security Auditing Tool

  1. Rafael Santana de Sousa May 25, 2011 at 7:30 pm #

    Hey, thank you for this site.

    Can I ask you something? A have a site that blocks ‘_’. I found a SQL Injection there. It’s a MySQL 5.1 nut I not able to exploit this because of this damn filter. So i can’t run SELECT schema_name FROM information_schema.schemata; or SELECT table_schema,table_name FROM information_schema.tables WHERE table_schema != ‘mysql’ AND table_schema != ‘information_schema’, etc.

    Do you know any way to bypass this filter?

    Thank you