> cat /dev/github | grep security-tools
discovered 30 Mar 2026

sipvicious

Python ★ 1061 via github-topic
→ View on GitHub

AI Summary: SIPVicious OSS is a comprehensive toolset designed for auditing SIP-based VoIP systems. Its primary functions include discovering SIP servers, enumerating extensions, and facilitating password cracking through various methods, making it an essential resource for penetration testing of VoIP infrastructures. Notable features include its scanning capabilities (svmap), extension identification (svwar), password cracking (svcrack), session reporting (svreport), and the ability to exploit vulnerabilities in SIP systems (svcrash).


README

Welcome to SIPVicious OSS security tools

SIPVicious mascot

SIPVicious OSS is a set of security tools that can be used to audit SIP based VoIP systems. Specifically, it allows you to find SIP servers, enumerate SIP extensions and finally, crack their password.

To get started read the following:

For usage help make use of -h or --help switch.

A note to vendors and service providers

If you are looking for professional VoIP and WebRTC penetration testing services, please check out our offerings at Enable Security.

The tools

The SIPVicious OSS toolset consists of the following tools:

  • svmap
  • svwar
  • svcrack
  • svreport
  • svcrash

svmap

this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP servers 
which it finds on the way. Also has the option to scan hosts 
on ranges of ports.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVMap-Usage>

svwar

identifies working extension lines on a PBX. A working 
extension is one that can be registered. 
Also tells you if the extension line requires authentication or not. 

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVWar-Usage>

svcrack

a password cracker making use of digest authentication. 
It is able to crack passwords on both registrar servers and proxy 
servers. Current cracking modes are either numeric ranges or
words from dictionary files.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrack-Usage>

IPv6 target syntax

  • svwar and svcrack accept -6 with either a bare IPv6 literal such as 2001:db8::10 or a URI such as udp://[2001:db8::10]:5060.
  • svmap accepts -6 with bare or bracketed IPv6 literals such as 2001:db8::10 or [2001:db8::10].
  • svmap does not accept URI syntax for IPv6 targets. Use -p to choose the destination port, for example sipvicious_svmap -6 -p 5060 [2001:db8::10].

svreport

able to manage sessions created by the rest of the tools
and export to pdf, xml, csv and plain text.

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVReport-Usage>

svcrash

responds to svwar and svcrack SIP messages with a message that
causes old versions to crash. 

Usage: <https://github.com/EnableSecurity/sipvicious/wiki/SVCrash-FAQ>

Installation

Please refer to the installation documentation.

Further information

Check out the wiki for documentation.