• Stars
    star
    17
  • Rank 1,257,181 (Top 25 %)
  • Language
    Shell
  • License
    GNU General Publi...
  • Created almost 5 years ago
  • Updated over 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

New continually changing MAC spoofer concept to thwart trackers; randomizes mac address at random times) prevents WIFI access point location tracking/MAC change patterns, permanent mac setting included

More Repositories

1

wipri

(Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing w/Brand Mimics: run as command or optional new randomized identity each boot; includes flags for continually changing random times/changing valid OUI addresses + Hostname randomizer + Device/Signal/location anonymization
Shell
49
star
2

snowflake-tor-service

Automated πŸ§… Tor ❄️ Snowflake Proxy (any Linux device). Run install.sh and you have a new Snowflake ProxyService (every boot)
Shell
23
star
3

Pine64-Mesh-Related

Playing with Pine64's LoRa board/modules (documenting/sharing along the way)
Shell
10
star
4

Tor-Browser-Pinephone

Setting up Tor Browser port + adding button to Phosh/Linux phones
8
star
5

ssh-onion

create ssh onion - + other scripts to help friend remotely
Shell
4
star
6

Gitea-Onion

Convert Gitea (Git Service) To Tor Hidden Onion Service
Shell
2
star
7

mnt-pi-img

Mount Raspberry Pi OS Image File For Editing
Shell
2
star
8

macprivacy

MAC address & hostname privacy as a systemd service or standalone command
Shell
2
star
9

linux-cheat-sheet

Linux absolute beginner command reference cheatsheet (command + picture)
Shell
1
star
10

RTPBox

1
star
11

I2P-desktop

I2P Desktop Browser Button Autostarts i2prouter + Librewolf I2p Profile + Stops i2prouter on browser close
JavaScript
1
star
12

honeychl

script to log time/ip address "honeypot calls home" to webserver (of target who loads remotely hosted embedded content such as picture in local downloaded file)- An example of targeted privacy breach
Python
1
star
13

crypto_homes

Pinephone: Convert $HOME dir to encrypted sdcard with USB stick hardware key to unlock
Shell
1
star