New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point location tracking/MAC change patterns, permanent mac setting included
☆17Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for MACcleaner
Users that are interested in MACcleaner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆55Jan 25, 2024Updated 2 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- ☆10Oct 14, 2020Updated 5 years ago
- find where an image is taken☆18Jul 14, 2022Updated 3 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Config files for my GitHub profile.☆18Mar 21, 2026Updated last month
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Fake WiFi Access Point with captive portal☆11May 18, 2025Updated 11 months ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Files for the Wi-Fi duck workshop☆12Jan 26, 2020Updated 6 years ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆14Feb 24, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆13Aug 31, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Jul 13, 2021Updated 4 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Totem maltego transform☆29Sep 23, 2020Updated 5 years ago
- Target files to hack☆15Apr 21, 2020Updated 6 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools that can be useful for OSEP exam and PEN300 studies.☆88Mar 14, 2026Updated last month
- A cryptographically secure pin code generator for NodeJS☆14Feb 27, 2023Updated 3 years ago
- 😎 Awesome list of all things related to Microsoft Graph PowerShell☆13Apr 7, 2024Updated 2 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14Apr 14, 2026Updated 2 weeks ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- ESP32 Camera Hacking Workshop☆14Feb 17, 2020Updated 6 years ago
- Prepend `https://` to humanized URLs like `sindresorhus.com` and `file://` to file paths☆25Jul 9, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing …☆16Dec 8, 2022Updated 3 years ago
- Generate a 360 degree view of a user's permissions in Microsoft 365☆18Apr 3, 2026Updated 3 weeks ago
- 🕶 Remove GPS data from your photos before you upload them.☆14Jan 29, 2018Updated 8 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated 2 years ago
- Adds encrypted swap file to the system - for better protection of locally stored data and to aid environments with low RAM. https://www.k…☆15Mar 28, 2026Updated last month
- HackRF experimentation☆11Jun 3, 2023Updated 2 years ago