A short PHP script that demonstrates how to do caller ID spoofing in Asterisk. Reading through the code should explain how to do it in other languages.
This is F.O.B. (Flexible Orange Box), inspired by the popular S.O.B. (Software Orange Box) program for Windows.
When connecting SIP FXS devices with a Class 5 switch, the ATA will not see a Call Waiting presented to it when there is a Call Waiting. Thus, it is necessary to signal the FSK directly to the CPE in-band from the switch. Asterisk does not have any provision to do this, so this needs to be done with an external program.
This program is intended to be a legitimate Type II Caller ID Generator, used for the purpose of Call Waiting Caller ID (Of course, functionally, it can be used just like any other orange box to spoof call waitings if desired - we are not responsible for any misuse of this program). This allows you to send Call Waiting Caller ID to a remote endpoint, even if no Call Waiting is presented to the remote endpoint (e.g. Analog Telephone Adapter), allowing for CWCID to be provided even when advanced bridging capabilites are being used, by "orange boxing" in band for legitimate purposes.
A utility written in Python that monitors a wireless network to find the most active users and lets you mess with their connection. You can spy on them or inject arbitrary stuff into their web traffic. Can also be used as a jammer. Pretty heavy dependencies but nobody in their right mind would rewrite them all for a single utility. Supports credential harvesting and dns spoofing.
Deprecated. Read through this to get an idea of how things work.
A utility which uses the FUSE functionality of the Linux kernel to implement NFS in such a way that it can spoof user credentials when mounting exported file systems so you can get access to files that you wouldn't be able to otherwise.