This repository presents a comprehensive examination of VoIP caller ID spoofing techniques and the creation of automated scam call bots (commonly known as "P1 bots"). The research focuses on understanding how threat actors exploit SIP trunks and VoIP infrastructure to execute large-scale phone spoofing campaigns.
By analyzing typical setups and tools, this project sheds light on the vulnerabilities within the VoIP ecosystem and highlights methods that scammers employ to evade detection and automate fraud.
Note: This repository does not provide operational scripts or exploits. Instead, it documents the concepts, workflows, and tooling that malicious actors might use, including a SIP provider setup hosted on voizhen.com. This allows safe research and experimentation aimed at disrupting scam networks.
- Concept.md — Core concepts behind caller ID spoofing and P1 bots
- Requirements.md — Necessary components and tools, including our custom SIP provider
- Setup.md — Step-by-step setup of a VoIP spoofing environment using Asterisk or FreePBX
- Tools.md — Overview of custom research tools developed to monitor and bait scam operations
- References.md — Curated external resources for deeper understanding
- SIP trunk configuration for spoofed calls
- Automated call bots (P1 bots) and their operational patterns
- Techniques used by scammers to bypass fraud detection
- Methods for creating honeypots and baiting scam callers
- Vulnerabilities in caller ID authentication
- VoIP infrastructure abuse and scammer disruption
This project is intended solely for cybersecurity research, educational purposes, and scammer disruption initiatives. Any misuse of the information contained herein for unlawful activity is strictly prohibited.
For collaboration or inquiries, please reach out via Tox or Sessions: TOX : 401499A860FBC70E933A75DC44ADC86155B89E6F7CD10D3EB95F8723841B2F305F3FE82E8C1D Sessions : 0588cefde11813ddcb71d219b454620656188e0ee06c8533fd37d35421326c5d16