New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point location tracking/MAC change patterns, permanent mac setting included
☆18Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for MACcleaner
Users that are interested in MACcleaner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆55Jan 25, 2024Updated 2 years ago
- ☆14Sep 30, 2021Updated 4 years ago
- Get all saved Wi-Fi password list using python. Just run the program see passwords easily. Watch video tutorial on YouTube :-☆11Jan 2, 2021Updated 5 years ago
- Tool to view & parse HCCAPX files☆19Aug 5, 2020Updated 5 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Brute force to crack wpa2-psk wifi password☆13Aug 25, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 10 months ago
- Config files for my GitHub profile.☆18Mar 21, 2026Updated 2 months ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- a control panel for managing Lokinet☆19May 18, 2022Updated 4 years ago
- Fake WiFi Access Point with captive portal☆11May 18, 2025Updated last year
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Yet another Windows DLL injector.☆39Nov 17, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- public domain usb hacking logos☆12Sep 23, 2021Updated 4 years ago
- Target files to hack☆15Apr 21, 2020Updated 6 years ago
- I2P monitor and control application for Mac OS X☆11Jul 10, 2016Updated 9 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19May 14, 2026Updated last week
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆15Feb 24, 2021Updated 5 years ago
- SlideDecks from Meetups☆12May 12, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆22May 14, 2026Updated last week
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 8 months ago
- Code examples from my book and class, PowerShell for Systems Engineers.☆11Jan 6, 2023Updated 3 years ago
- Tools that can be useful for OSEP exam and PEN300 studies.☆90Mar 14, 2026Updated 2 months ago
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆15Apr 14, 2026Updated last month
- 😎 Awesome list of all things related to Microsoft Graph PowerShell☆13Apr 7, 2024Updated 2 years ago
- Schedules fetching all repos in a working folder from Git, and optionally pulls changes if there are no conflicts.☆11Jan 5, 2023Updated 3 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- Stripe Identity Verification API demo app hosted on Codesandbox☆11Jan 6, 2023Updated 3 years ago
- ESP32 Camera Hacking Workshop☆14Feb 17, 2020Updated 6 years ago
- Prepend `https://` to humanized URLs like `sindresorhus.com` and `file://` to file paths☆25Jul 9, 2022Updated 3 years ago
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- Generate a 360 degree view of a user's permissions in Microsoft 365☆18Apr 27, 2026Updated 3 weeks ago
- Listen in on TCP conversations on the network your computer is attached to☆18Jan 15, 2023Updated 3 years ago