tamilselvanarjun / finger-putty

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Finger Putty

Finger Putty is an OS fingerprint spoofer that modifies the TCP/IP stack to alter outgoing packets and defeat Nmap fingerprinting. Launching the program using the start.sh file will also give your computer a temporary MAC address and launch Chrome with a user agent matching your (spoofed) Nmap fingerprint.

To open the application run python bindGUI.py from the appropriate directory in the command line.

Development still in progress - use at your own risk.

For use on OSX 10.8.x+

Planned features:

  • Additional profiles (Windows 8, Playstation/Xbox, Android)
  • Wrap source as OSX app (py2app)

Known issues:

  • Spoofed user agent OS and Nmap fingerprint OS don't dynamically match
  • Nmap fingerprinting often results in an error (no OS found) rather than profile OS

About


Languages

Language:Python 96.6%Language:Shell 3.4%