AMC- Automatic Media Access Control [MAC] Address Spoofing Tool

Overview

AMC- Automatic Media Access Control [MAC] Address Spoofing Tool

info Open source CC-0 license Python status

About

AMC (Automatic Media Access Control [MAC] Address Spoofing tool), helps you to protect your real network hardware identity. Each entered time interval your hardware address was changed automatically. without interrupting your internet connection.

Tested On

Sr. Operating System Version Virtual Box VM Ware Network Type
1 Kali Linux 2021.2 status status network
2 Kali Linux 2021.1 status status network
3 Kali Linux 2020.4 status status network
4 Kali Linux 2019.4 status status network
5 Kali Linux 2018.4 status status network
6 Ubuntu 20.04 status status network
7 Debian 10.0 status status network

Features

  1. Lightweight and multiple methods for use.
  2. User-friendly and easily understandable for new users.
  3. Automatically change network hardware address without losing internet connectivity.
  4. User-friendly command-line-based user interface.

User Type

User must be super user / root user.

Required packages

  • net-tools required
  • network-manager required
  • macchanger required
  • pyinstaller Optional

Process of installation

Update your Debian based Linux

sudo apt-get clean -y
sudo apt-get update -y

Create new directory

mkdir 'AMC20' && cd 'AMC20'

Let's Clone AMC-2.0 from GitHub

git clone "https://github.com/hexdee606/AMC2.0.git"

Install required packages

System packages

sudo apt-get install net-tools -y
sudo apt-get install network-manager -y
sudo apt-get install macchanger -y

Method 1: Automatically

sudo pip3 install requirement.txt

Method 2: Manually

sudo pip3 install pyinstaller -y

First-time Run AMC-2.0

Method 1: Using python3

 sudo python3 amc.py -h

Method 2 : Using shell script

sudo chmod +x amc.sh
sh ./amc.sh

Method 3 : Using desktop file

sudo chmod +x amc.sh
sudo chmod +x run-amc.desktop
Double click on run-amc.desktop

Method 4 : By creating an executable file

pyinstaller --onefile amc.py
cd dist
./amc -h

Available options

[-h]    Help menu 

-a/--about	: About Alchemists.

-i/--interface	: Network interface name.

-j/--join	: Join Alchemists.

-l/--license	: AMC License.

-n/--network	: Available network interface.

-t/--time	: Time in seconds.

-v/--version	: Version information.

Use AMC-2.0

Method 1: Using python3

 sudo python3 amc.py -i eth0 -t 30

Method 2 : Using shell script

sh ./amc.sh

Method 3 : Using desktop file

Double click on run-amc.desktop

Method 4 : By creating an executable file

cd dist
./amc -i eth0 -t 30

Troubleshooting methods:

If unable to access internet/ connection not established then do the following step (after using AMC):

macchanger -p {Network Interface}

If AMC is not working then do the following process:

sudo nano /etc/NetworkManager/NetworkManager.conf
default: managed=false
To change: managed=true

Connect Us

Research and Development

twitter github email

Research and Testing

twitter github email twitter github email twitter github email

We hope you like our project. If 'Yes' click on the star icon at the top right corner or leave a comment so we can improve this script.

❤️ from Alchemists.

You might also like...
Click-Jack - Automatic tool to find Clickjacking Vulnerability in various Web applications
Click-Jack - Automatic tool to find Clickjacking Vulnerability in various Web applications

CLICK-Jack It is a automatic tool to find Clickjacking Vulnerability in various

Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.

Take Note! With the exception of issues and PRs regarding changes to hosts/data/StevenBlack/hosts, all other issues regarding the content of the produ

Separate handling of protected media in Django, with X-Sendfile support

Django Protected Media Django Protected Media is a Django app that manages media that are considered sensitive in a protected fashion. Not only does t

A python script to decrypt media files encrypted using the Android application 'Decrypting 'LOCKED Secret Calculator Vault''. Will identify PIN / pattern.

A python script to decrypt media files encrypted using the Android application 'Decrypting 'LOCKED Secret Calculator Vault''. Will identify PIN / pattern.

macOS Initial Access Payload Generator

Mystikal macOS Initial Access Payload Generator Related Blog Post: https://posts.specterops.io/introducing-mystikal-4fbd2f7ae520 Usage: Install Xcode

Backdoor is a term that refers to the access of the software or hardware of a computer system without being detected.
Backdoor is a term that refers to the access of the software or hardware of a computer system without being detected.

This program is an non-object oriented opensource, hidden and undetectable backdoor/reverse shell/RAT for Windows made in Python 3 which contains many features such as multi-client support and cross-platform server.

A simple Outline Server Access Key Copy and Paste Web Interface

Outline Keychain A simple Outline Server Access Key Copy and Paste Web Interface Developed for key and password export and copy & paste for other Shad

Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, downloads, history, and more.
Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, downloads, history, and more.

ChromePE [Linux/Windows] Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, download

An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.

TMOHS1 Root Utility Description An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several

Comments
Releases(v2.0-beta.3)
  • v2.0-beta.3(May 4, 2022)

  • v2.0-beta.2(Sep 29, 2021)

    • [x] Fix minor error in UI.
    • [x] Enhancement in Shell Script, Add new option.
    • [x] Fix requirements.txt error.
    • [x] Fix banner image error in the readme, index, and wiki webpage.
    Source code(tar.gz)
    Source code(zip)
  • v2.0-beta.1(Sep 27, 2021)

Owner
Dipen Chavan
Welcome to GitHub, I'm a 25-year-old self-called software developer and support engineer. Is my job to code and troubleshoot the errors I found.
Dipen Chavan
NexScanner is a tool which allows you to scan a website and find the admin login panel and sub-domains

NexScanner NexScanner is a tool which helps you scan a website for sub-domains and also to find login pages in the website like the admin login panel

8 Sep 03, 2022
Searches for potentially vulnerable websites to local file inclusion, throughout the web and then exploits them for LFI

LFI-Hunter Searches for potentially vulnerable websites to local file inclusion, throughout the web and then exploits them for LFI A script written in

Anukul Pandey 6 Jan 30, 2022
This tool was created in order to automate some basic OSINT tasks for penetration testing assingments.

This tool was created in order to automate some basic OSINT tasks for penetration testing assingments. The main feature that I haven't seen much anywhere is the downloadd google dork function where t

Tobias 5 May 31, 2022
This repository consists of the python scripts for execution and automation of vivid tasks.

Scripting.py is a repository being maintained to keep log of the python scripts that I create for automating and executing some of my boring manual task.

Prakriti Regmi 1 Feb 07, 2022
Local server for IDA Lumina feature

About POC of an offline server for IDA Lumina feature.

Synacktiv 166 Dec 30, 2022
DoSer.py - Simple DoSer in Python

DoSer.py - Simple DoSer in Python What is DoSer? DoSer is basically an HTTP Denial of Service attack that affects threaded servers. It works like this

1 Oct 12, 2021
the swiss army knife in the hash field. fast, reliable and easy to use

hexxus Hexxus is a fast hash cracking tool which checks more than 30 thousand passwords in under 4 seconds and can crack the following types bcrypt sh

enigma146 17 Apr 05, 2022
Python library to remotely extract credentials on a set of hosts.

Python library to remotely extract credentials on a set of hosts.

Pixis 1.5k Dec 31, 2022
利用NTLM Hash读取Exchange邮件

GetMail 利用NTLM Hash读取Exchange邮件:在进行内网渗透时候,我们经常拿到的是账号的Hash凭据而不是明文口令。在这种情况下采用邮件客户端或者WEBMAIL的方式读取邮件就很麻烦,需要进行破解,NTLM的破解主要依靠字典强度,破解概率并不是很大。

<a href=[email protected]"> 388 Dec 27, 2022
MS-FSRVP coercion abuse PoC

ShadowCoerce MS-FSRVP coercion abuse PoC Credits: Gilles LIONEL (a.k.a. Topotam)

Shutdown 219 Dec 28, 2022
Worm/Trojan/Ransomware/apt/Rootkit/Virus Database

Pestilence - The Malware Database [] Screenshot Pestilence is a project created to make the possibility of malware analysis open and available to the

*ERR0R* 47 Dec 21, 2022
Fast python tool to test apache path traversal CVE-2021-41773 in a List of url

CVE-2021-41773 Fast python tool to test apache path traversal CVE-2021-41773 in a List of url Usage :- create a live urls file and use the flag "-l" p

Zahir Tariq 12 Nov 09, 2022
MozDef: Mozilla Enterprise Defense Platform

MozDef: Documentation: https://mozdef.readthedocs.org/en/latest/ Give MozDef a Try in AWS: The following button will launch the Mozilla Enterprise Def

Mozilla 2.2k Jan 08, 2023
This repo created for bypassing Widevine L3 DRM and obtaining keys.

First run: Copy headers (with cookies) of POST license request from browser to headers.py like dictionary. pip install -r requirements.txt # if doesn'

Mikhail 263 Jan 07, 2023
You can manage your password with this program.

You must have Python compilers in order to run this program. First of all, download the compiler in the link.

Mustafa Bahadır Doğrusöz 6 Aug 07, 2021
Natas teaches the basics of serverside web-security.

over-the-wire-natas Natas teaches the basics of serverside web-security. Each level of natas consists of its own website located at http://natasX.nata

Siddhant Chouhan 1 Nov 27, 2021
Python lib to automate basic QFT calculations like Wick-contractions.

QFTools Python lib to automate basic QFT calculations like Wick-contractions. Features Wick contractions for real scalar fields Wick contractions for

2 Aug 21, 2022
FTP-Exploits is a tool made in python that contains 4 diffrent types of ftp exploits that can be used in Penetration Testing.

FTP-exploits FTP-exploits is a tool which is used for Penetration Testing that can run many kinds of exploits on port 21(FTP) Commands and Exploits Ex

1 Dec 26, 2021
A Modified version of TCC's Osprey poc framework......

fierce-fish fierce-fish是由TCC(斗象能力中心)出品并维护的开源漏洞检测框架osprey的改写,去掉臃肿功能的精简版本poc框架 PS:真的用不惯其它臃肿的功能,不过作为一个收集漏洞poc && exp的框架还是非常不错的!!! osprey For beginners fr

lUc1f3r11 10 Dec 30, 2022
This is a repository filled with scripts that were made with Python, and designed to exploit computer systems.

PYTHON-EXPLOITATION This is a repository filled with scripts that were made with Python, and designed to exploit computer systems. Networking tcp_clin

Nathan Galindo 1 Oct 30, 2021