Showing 18 open source projects for "spoofing tool"

View related business solutions
  • Add Two Lines of Code. Get Full APM. Icon
    Add Two Lines of Code. Get Full APM.

    AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.

    Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
    Start Free
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    HWID Spoofer - Hardware ID Changer

    HWID Spoofer - Hardware ID Changer

    The best HWID Spoofer in 2025.

    TraceX is a powerful and advanced HWID Spoofer designed to bypass anti-cheat systems in games like Valorant, Apex Legends, Warzone, Fortnite, and more. It spoofs critical system identifiers such as disk serials, MAC addresses, BIOS UUIDs, motherboard and GPU IDs, and even EFI boot variables. This HWID Spoofer also includes a full system cleaner that removes traces of game activity, browser data, event logs, Xbox and Discord accounts, and network fingerprints. With deep spoofing of CPU,...
    Leader badge
    Downloads: 1,566 This Week
    Last Update:
    See Project
  • 2
    HeadlessX

    HeadlessX

    The undetected self-hosted browser automation platform

    ...It is built using modern technologies including Node.js, Next.js, TypeScript, and Playwright, and uses a specialized browser engine called Camoufox based on Firefox. One of the platform’s goals is to bypass common bot-detection systems by implementing advanced fingerprint spoofing and stealth techniques. The tool can perform tasks such as HTML extraction, screenshot generation, content parsing, and search result scraping while appearing like a normal user browser. Because it is self-hosted, organizations can run the platform on their own infrastructure to maintain privacy and control over automation workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    MRcutter

    MRcutter

    MRcutter – Windows ARP spoofing & network control tool

    🚦 MRcutter A network control & monitoring tool Built with ❤️, ☕, and controlled chaos by Ronny Rogers (Mugabo Rongin) 🧠 What is MRcutter? MRcutter is a lightweight LAN network management tool that lets you: ✂️ Cut internet access 🐌 Limit bandwidth for particular devices or even for all devices 👀 Monitor devices on your Local Area Network 🎯 Take speed control over a Wi-Fi 😈 Why MRcutter? Because: * your internet is slow like a snail * Your ping is higher...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Ubuntu Mate + Hacking Tools

    Ubuntu Mate + Hacking Tools

    Ubuntu Mate Hacking Distro

    Ubuntu Mate + FSociety Hacking Tools is a distro with hacking tools which can be downloaded in the following link: https://www.mediafire.com/file/6jo2ln3xjqrk5jn/custom-dist.iso/file FSociety integrates tools used for Information Gathering, Password Attacks, Wireless Testing, Exploitation tools, Sniffing & Spoofing, Web Hacking, Private Web Hacking, Post Exploitation. These tools are integrated in just one command. The distro is useful for those who want a Ubuntu Mate with tools like Katoolin, Tool-X or IntRec, which are compatible. To execute hacking tools in Ubuntu Mate enter Menu>Terminal and write sudo su fsociety To Upgrade your system to the latest version use the following command in Terminal: sudo apt-get upgrade Includes KaliLinux Repositores + ClassicMenu Indicator Recommended Requirements for HD 720p Optimal Setting: Intel Core Processor 8GB RAM 2GB GDDR5 GPU 120GB SSD
    Downloads: 0 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    iPhone Location Changer
    ...In addition, by spoofing the iPhone location, fake GPS location can avert apps from tracking the location.  One of the robust features of this iOS location spoofer is that it can stimulate GPS movement along with customization of paths at natural speed. The location spoofer tool lets you play LBS games without leaving your current location.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Evil Limiter

    Evil Limiter

    Tool that monitors, analyzes and limits the bandwidth of devices

    A tool to monitor, analyze and limit the bandwidth (upload/download) of devices on your local network without physical or administrative access. Evil Limiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 7
    Simple DNSCrypt

    Simple DNSCrypt

    A simple management tool for dnscrypt-proxy

    SimpleDnsCrypt is a user-friendly graphical interface for dnscrypt-proxy, designed to make encrypted DNS resolution simple and accessible for Windows users who want to improve their privacy and security without delving into complex command-line tools. It provides an intuitive control panel where individuals can enable DNS encryption (such as DNS-over-HTTPS or DNS-over-TLS), select trusted resolvers, and configure advanced options like upstream resolver lists, fallback settings, and filtering...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 8

    must: A More Useful Syslog Test tool

    A syslog message generator that replicates real syslog messages

    Using templated message formats with customisable placeholders, run in configurable sequences that can selectively reuse data between steps, must allows more intelligent testing of syslog receivers with realistic data, as well as longer soak testing and stress testing. must was created to fill a gap found when trying to stress test Splunk as real, indexable and meaningful data was needed. must will (eventually) be provided as a standalone tool that uses XML configs (for quick use and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    E-mail Spoofer is a tool designed for penetration testers who need to send phishing e-mails. It allows to send mails to a single recipient or a list, it supports plain text/html email formats, attachments, templates and more... Update Version 1.1: =============== * Added text conversion to Homographs for bypassing spam filters. (based on http://www.exploit-db.com/wp-content/themes/exploit/docs/20114.pdf) * Added Reply-To header * Added Sender Name Field * Added Built in User...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Change MAC Address

    Change MAC Address

    Change your MAC address

    This tool changes your MAC address. Changing MAC address of a machine is called spoofing a MAC address or faking a MAC address. These are the reasons you should change the MAC address of your machine. For privacy - For instance when you are connecting to a Wi-Fi hotspot. To ensure interoperability - Some internet service providers bind their service to a specific MAC address; if the user then changes their network card or intends to install a router, the service won't work anymore. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    BHS Debian (Hades Update)

    BHS Debian (Hades Update)

    BHS debian (testing) jessie/sid

    BHS (Debian) New BHS release Based on Debian jessie/sid Kermel 3.12 KDE 4.11 Debian style and look Custom scripts!! Defcon tools!! New wifi scripts Multiarch support Top tools username: root password: BHS note: Don't forget to run the script located on the desktop to install the missing tools,because without to run it the menu will not be functional,if you not see it just download from here in the file section..sorry for the delay the upload stack for 2...
    Downloads: 51 This Week
    Last Update:
    See Project
  • 12
    Jmeter Enhancements

    Jmeter Enhancements

    This project contains some useful enhancements implemented in Jmeter.

    ...Bandwidth Throttling: More enhancements such as follows are also implemented. -Bandwidth throttling -Dynamic bandwidth throttling -IP Spoofing -TPC-C Sampler -Smtp config element -Filterd Results Plugin please refer description.pdf in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Eolos VoipAudit

    Eolos VoipAudit

    Universal Framework to audit Voip protocols's security

    Visual Framework Tool to scan/sniff address space, enumerate users, crack credentials, pattern based dial spoofing and security reporting for Voip protocols. This software is intended to give a general framework to build and plug Voip protocol analizers in order to fix security issues and enhance VoiP platforms confidence. It IS NOT intended to be a cracking tool for malicious system breakers, but a really software MUST for security people to assure Voip platform security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    etherwall
    Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others. Note: For personal computer use only (client security) if you like this program, please give us your vote at http://sourceforge.net/projects/etherwall/reviews/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This is a program built on top of Python, Scapy, and Scapy EIGRP to aid in auditing the security of EIGRP implementations. Read the white-paper at https://docs.google.com/document/d/1ZVNwi5KRkbY_PxMoODTvwSh3qpzdqiRM9Q4qppP2DvE/edit?pli=1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Jiblooms is a LAN tool for packet manipulation and such. Due to being written in python, the file has a relatively large size.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SING stands for 'Send ICMP Nasty Garbage'. It is a tool that sends ICMP packets fully customized from command line. Its main purpose is to replace the ping command but adding certain enhancements (Fragmentation, spoofing,...)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    The goals of the tool are: 1. improve usability for the less technical educated 2. 'anonymous' ( ip spoofing, others? ) 3. Better support for a distributed tracker-like target list ( multi target, multi server ). LOIC-like tool, also in C#
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB