(Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing w/Brand Mimics: run as command or optional new randomized identity each boot; includes flags for continually changing random times/changing valid OUI addresses + Hostname randomizer + Device/Signal/location an…
☆56Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for wipri
Users that are interested in wipri are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point locat…☆17Jul 2, 2021Updated 4 years ago
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago
- Experimenting with LoRa Backplate for PinePhone☆15Dec 7, 2021Updated 4 years ago
- Discover the simplicity and efficiency of Void Linux on your Android device with VoidMagic! 🚀☆10Dec 11, 2023Updated 2 years ago
- 🛸 Reddit integration into Nextcloud☆15Updated this week
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- Target files to hack☆15Apr 21, 2020Updated 5 years ago
- Latest instagram follower increaser 2023 in python 100% Real using instagram api☆19Aug 19, 2023Updated 2 years ago
- Y Combinator Hacker News menu tab for mac☆196May 23, 2017Updated 8 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Anonymous Plurk Cross-matching Tool - Plurk偷偷說交叉比對工具☆23Dec 17, 2017Updated 8 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆48Nov 1, 2022Updated 3 years ago
- Fast setup wireguard server script, with tor, dnscrypt and adblocking, maleware blocking, more blocking if you need. Use case eg. always …☆55Jul 1, 2023Updated 2 years ago
- Anonymize UUIDs outputs (written in Golang)☆19Mar 1, 2026Updated 3 weeks ago
- Create anonymous components to use hooks anywhere in your render tree.☆11Sep 14, 2022Updated 3 years ago
- FACEBOOK BOT SPAM SHARE The function of this tool is to share spam posts you want using the URL post from Facebook Lite. You need an ext…☆15Jan 11, 2024Updated 2 years ago
- A single-user database for Mac and iOS that provides multi-client synchronization using cloud storage☆12Dec 23, 2017Updated 8 years ago
- ☆13Mar 4, 2023Updated 3 years ago
- Python tools for ethical hacking☆45Jul 14, 2019Updated 6 years ago
- ☆12Oct 20, 2018Updated 7 years ago
- A Reverse Incremental Backup Script for RClone with support for Windows/Linux/Mac with Volume Shadow Copy (VSS) and email report.☆12Feb 3, 2020Updated 6 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- This code is designed to be used with the Macchina M2 (Arduino Due based). It uses OBD PID requests to run the gauge cluster in the Pors…☆12Feb 27, 2021Updated 5 years ago
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- ☆12Aug 3, 2020Updated 5 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆34Sep 19, 2023Updated 2 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- A simple service to handle processing of crypto payments.☆11Dec 11, 2022Updated 3 years ago
- Keychain USB multiple password manager/generator/injector☆11Dec 7, 2015Updated 10 years ago
- Tool to Create Media Windows 10 Boot☆17Apr 4, 2022Updated 3 years ago
- ☆14Aug 14, 2022Updated 3 years ago
- Detects near-by devices such as cell phones, tablets, and laptops. Does this through 802.11, Bluetooth, cell phone protocols, etc..☆18Mar 24, 2014Updated 11 years ago
- hacking tool menu!☆26Aug 4, 2021Updated 4 years ago
- A poc to demonstrate how ransomware can spread to enterprise apps through libraries☆11Mar 28, 2018Updated 7 years ago
- The ultimate & full guide on how to protect your privacy online & physical.☆30Sep 8, 2023Updated 2 years ago
- Linux Cyber Warfare Distro☆21Dec 16, 2025Updated 3 months ago
- Tools for photo library organization. Inadvisable hacks.☆16Feb 21, 2018Updated 8 years ago
- Simple CLI to extract messages (SMS/iMessage) to CSV from iPhone backups☆18Dec 6, 2018Updated 7 years ago