With the use of this tool, you can change your MAC address

Related tags

NetworkingMAC_CHANGER
Overview

Akshat0404/MAC_CHANGER

This tool has to be used on linux kernel.

Steps to use the tool:

  1. git clone https://github.com/Akshat0404/MAC_CHANGER.git
    
  2. Now open the MAC_CHANGER file.

  3. ./MAC_CHANGER
    
  4. Now look for a python file named mac_changer.py in MAC_CHANGER directory using ls command.

  5. Now run the mac_changer.py using the command;

     python3 mac_changer.py -h
     
     python3 mac_changer.py --help
    
  6. The -h or --help will list out the following arguments that can be used using this tool:

     Usage: mac_changer.py [options]
    
        Options:
    
        -h, --help            show this help message and exit
    
        -n NETWORK_INTERFACE, --network_interface=NETWORK_INTERFACE
                               Name of the network interface of which the MAC address
                               has to be changed
    
        -c NEW_MAC, --new_mac=NEW_MAC
                              New MAC address
    
  7. Now in the next few commands, we will see how this tool works.

  8. Here we use -n or --network_interface to specify the network interface to which we wanna change the MAC address.

    -c or --new_mac is used to specify the new mac address.

    Below is a demo command;

     python3 mac_changer.py -n eth0 -c 00:a4:45:56:f2:6b;
    
  9. By running this command the mac address of the network interface eth0 changes to the mac address we want i.e. 00:a4:45:56:f2:6b and the following message will appear after the successful execution of the command;

     [+] MAC address of eth0 has been changed to 00:a4:45:56:f2:6b.
    

    The same implies for the network interface wlan0.

  10. Now if we run the ifconfig command, we can see that the MAC address has been changed to 00:a4:45:56:f2:6b;

    ifconfig

        eth0: flags=xxxx
         
            mtu xxxx
    
            inet xx.x.x.xx  netmask xxx.xxx.xxx.x  broadcast xx.x.x.xxx
    
            ether 00:a4:45:56:f2:6b  txqueuelen xxxx  (Ethernet)
    
            RX packets xx  bytes 46960 (45.8 KiB)
    
            RX errors 0  dropped 0  overruns 0  frame 0
    
            TX packets xx  bytes 10412 (10.1 KiB)
    
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
    
        lo: flags=xx
          
             mtu xxxxx
    
            inet xxx.x.x.x  netmask xxx.x.x.x
    
            inet6 ::x  prefixlen xxx  scopeid 0x10
           
            
    
            loop  txqueuelen xxxx  (Local Loopback)
    
            RX packets x  bytes 400 (400.0 B)
    
            RX errors 0  dropped 0  overruns 0  frame 0
    
            TX packets 8  bytes 400 (400.0 B)
    
            TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
    
           
          
         

    PS: I have denoted some sensitive information with x.

  11. We all know that lo network interface doesn't need a MAC address;

     python3 mac_changer.py -n lo -c 00:11:22:33:44:55
    

    So if we mention in the network interface argument, the following error appears

     Usage: mac_changer.py [options]
    
     mac_changer.py: error: [-] This network interface does not have MAC address
    
  12. We know that wlan0, lo and eth0 are the valid network interfaces among which only wlan0 and eth0 need a MAC address. So, if any other interface is mentioned other than wlan0 and eth0, the following error message shows up;

     python3 mac_changer.py -n wlan -c 00:00:00:00:00:00
    

    In the above command I have specified wlan as network interface, which is not valid, lets see what the tool does after this command.

    Usage: mac_changer.py [options]
    
    mac_changer.py: error: [-] wlan is not a valid network interface. Please specify a valid network interface.
    
  13. We also know that MAC address is of the format xx:xx:xx:xx:xx:xx, where x is any number from 0-9, lower case alphabet from a-f or upper case alphabet from A-F.

    python3 mac_changer.py -n eth0 -c 00:29:4r:5h:Z2 
    

    As you can see the format of MAC address in the above command is wrong.

    So, if the incorrect format of MAC address is specified, an error message would show up;

    Usage: mac_changer.py [options]
    
    mac_changer.py: error: [-] You have specified an incorrect format for MAC address. Please Enter the MAC address in the format xx:xx:xx:xx:xx:xx, where x is lower case alphabets from a-f or upper case alphabets from A-F or numbers from 0-9.
    

I hope that this tool helps you. Thanks 😃

Medusa is a cross-platform agent compatible with both Python 3.8 and Python 2.7.

Medusa Medusa is a cross-platform agent compatible with both Python 3.8 and Python 2.7. Installation To install Medusa, you'll need Mythic installed o

Mythic Agents 123 Nov 09, 2022
Decentra Network is an open source blockchain that combines speed, security and decentralization.

Decentra Network is an open source blockchain that combines speed, security and decentralization. Decentra Network has very high speeds, scalability, asymptotic security and complete decentralization

Decentra Network 74 Nov 22, 2022
An ansible playbook to set up wireguard server.

Poor man's VPN (pay for only what you need) An ansible playbook to quickly set up Wireguard server for occasional personal use. It takes around five m

Amrit Bera 613 Dec 25, 2022
PetrickScanner is a simple Python OOP TCP Port Scanner

PetrickScanner PetrickScanner is a simple Python OOP TCP Port Scanner Functions Python TCP Port Scanner DNS Resolver Random Scanner PLEASE ANY PROBLEM

11 Nov 30, 2021
Cobalt Strike script for ScareCrow payloads

🎃 🌽 ScareCrow Cobalt Strike intergration CNA A Cobalt Strike script for ScareCrow payload generation. Works only with the binary and DLL Loader. 💣

UserX 401 Dec 11, 2022
OpenNeoMC:an Open-source Tool for Particle Transport Optimization that Combining OpenMC with NEORL

OpenNeoMC:an Open-source Tool for Particle Transport Optimization that Combining OpenMC with NEORL OpenMC is a community-developed Monte Carlo neutron

7 Aug 17, 2022
A benchmark for stateful fuzzing of network protocols

A benchmark for stateful fuzzing of network protocols

3 Apr 25, 2022
A simple implementation of an RPC toolkit

Simple RPC With Raw Sockets Repository for the Data network course project: Introduction In this project, you will attempt to code a simple implementa

Milad Samimifar 1 Mar 25, 2022
Simple self-hosted server to receive files from remote systems

Badtray This is a very simple self-hosted server to receive files from remote systems. This works similar to Bintray (RIP) and primarily designed to d

Alex Taradov 1 Nov 22, 2021
Throttle rTorrent on Plex stream Start/Stop

Dependencies Python 3.6+ Tautulli Script Setup Edit rtorrent_throttle.py and set rTorrent username, password and RPC2 url. Tautulli Setup Commum Scrip

4 Apr 25, 2022
A simple python script that parses the MSFT Teams log file for the users current Teams status and then outputs the status color to a MQTT connected light.

Description A simple python script that parses the MSFT Teams log file for the users current Teams status and then outputs the status color to a MQTT

Lorentz Factr 8 Dec 16, 2022
MS Iot Device Can Platform

Kavo MS IoT Platform Version: 2.0 Author: Luke Garceau Requirements Read CAN messages in real-time Convert the given variables to engineering useful v

Luke Garceau 1 Oct 13, 2021
Simple HTTP Server for CircuitPython

Introduction Simple HTTP Server for CircuitPython Dependencies This driver depen

Adafruit Industries 22 Jan 06, 2023
Arp-spoofing, this script was written for people who want to spoof any vulnerable machine such as Wİndows, of course it could have been more sophisticatedly created but these repos will be updated constantly

ARP-SPOOF ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area net

2 Dec 28, 2021
EchoDNS - Analyze your DNS traffic super easy, shows all requested DNS traffic

EchoDNS - Analyze your DNS traffic super easy, shows all requested DNS traffic

Oli Zimmermann 1 Jan 11, 2022
Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)

http-protocol-exfil Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1). It uses GET requests so the Blu

Ricardo Ruiz 23 Apr 30, 2022
An curated collection of awesome resources about networking in cybersecurity

An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and important practical resources about networking in cybersecurity

Paul Veillard, P. Eng 7 Nov 30, 2022
Tool for pretty printing and optimizing Lightning Network channels.

Suez Tool for pretty printing and optimizing Lightning Network channels. Installation Install poetry poetry install poetry run ./suez Channel fee poli

Pavol Rusnak 69 Nov 03, 2022
Repo used to maintain all notes and scripts developed during my DevNet Expert studies

DevNet Expert Studies Exam Date: TBD (Waiting for registration to open) This repository will be used to track my progress and maintain all notes/scrip

Dan 32 Dec 11, 2022
Enrich IP addresses with metadata and security IoC

Stratosphere IP enrich Get an IP address and enrich it with metadata and IoC You need API keys for VirusTotal and PassiveTotal (RiskIQ) How to use fro

Stratosphere IPS 10 Sep 25, 2022