Lackadaisical OPSec and Anonymity Toolkit - Public Release
Version 1.0.0 | Production Ready | Zero Bullshit
Your privacy is under attack. This is your counteroffensive.
The Lackadaisical OPSec and Anonymity Toolkit is a production-grade suite of 27+ privacy, anonymity, and operational security tools built for security professionals, journalists, privacy activists, researchers, and anyone who refuses to be surveilled.
Website: https://lackadaisical-security.com
GitHub: https://github.com/Lackadaisical-Security/Lackadaisical-Opsec-Anonymity-Tools
License: MIT (with export control compliance notices)
What Makes This Different?
Zero placeholders. Zero mock code. Zero "TODO" comments. Zero compromises.
This isn't a proof-of-concept GitHub repo with placeholder functions and aspirational README files. Every tool is production-ready, battle-tested, and actually works. If it's documented, it's implemented. Period.
Core Capabilities
🌐 Network Anonymization (9 Tools)
Full control over your network footprint:
- Tor Controller: Complete Tor integration with circuit management, identity rotation, connection monitoring
- DNS-over-HTTPS: Secure DNS with DoH support, multiple providers, leak prevention
- VPN Chaining: Multi-hop VPN configuration for layered anonymity
- DNS Leak Tester: Verify your DNS isn't leaking to your ISP
- HTTPS Enforcer: Force HTTPS connections, detect SSL/TLS issues
- Network Anonymizer: Automated multi-layer network anonymization
- Traffic Analyzer: Deep packet inspection and traffic analysis
- Packet Injector: Network packet manipulation and injection
- MAC Spoofer: Hardware address randomization
Use case: Tor + VPN + randomized MAC + DoH = layered anonymity that actually works
🔒 Data Security (5 Tools)
Protect your data like the NSA is watching (because they might be):
- Metadata Cleaner: Remove EXIF and metadata from images, PDFs, office documents
- Secure Shredder: Military-grade file deletion (DoD 5220.22-M, Gutmann 35-pass)
- Password Generator: Cryptographically secure passwords and passphrases
- Steganography: Hide data in images, audio, and files (LSB, DCT, spread spectrum)
- Secure Messenger: End-to-end encrypted messaging
Use case: Clean metadata → encrypt file → steganography → secure delete original
🎭 Identity Management (4 Tools)
Be anyone. Be no one:
- Pseudonym Generator: Generate realistic fake identities with complete backstories
- Biometric Spoofer: Generate synthetic biometric data (fingerprints, faces, voices)
- Credential Vault: Encrypted storage for managing multiple personas
- Browser Fingerprint Spoofer: Defeat browser fingerprinting and tracking
Use case: New identity for each operation, stored securely, fingerprintable by no one
🛡️ System Protection (5 Tools)
Monitor, harden, and protect your operational environment:
- Activity Monitor: Real-time threat detection and system monitoring
- Anti-Forensics: Defeat forensic analysis techniques (memory scrubbing, artifact removal)
- Filesystem Monitor: Detect unauthorized file access and modifications
- Privacy Check: System-wide privacy assessment and leak detection
- Trace Removal: Clean system logs, browser history, Windows artifacts
Use case: Real-time monitoring → detect intrusion → forensic wipe → no evidence
🔍 Analysis & OPSEC (4 Tools)
Know what you're leaking before adversaries do:
- Digital Footprint Analyzer: Comprehensive privacy exposure analysis
- Counter-Surveillance: Detect surveillance devices, network monitoring, and eavesdropping
- Memory Analyzer: Extract artifacts from RAM, detect malware and memory-resident threats
- Network Scanner: Stealthy network reconnaissance with service detection
Use case: Footprint analysis → counter-surveillance → memory forensics → harden
Multi-Language Implementation
23 programming languages. One goal: your privacy.
| Language | Purpose |
|---|---|
| Python | Main framework, most modules |
| C/C++/Assembly | High-performance system operations |
| Rust | Memory-safe system utilities |
| Go | Network tools, performance-critical components |
| JavaScript/TypeScript | Web privacy tools, browser extensions |
| Ruby, Perl, Lua | Scripting and text processing |
| PowerShell, Bash | System automation |
| .NET/C# | Windows privacy utilities |
| Java | Cross-platform GUI tools |
| Kotlin, Swift | Android/iOS privacy tools |
| Scala, Elixir | Distributed systems, privacy proxy |
| Haskell | Cryptographic tools |
| Clojure | Data anonymization |
| R, Julia | Statistical privacy analysis |
| Dart | Mobile privacy shield |
| Nim | Stealth communication |
Why? Because the right tool for the job matters. Network probes in Assembly are fast. Statistical analysis in R is robust. Mobile tools in Kotlin/Swift are native.
Platform Support
- ✅ Linux (full support, recommended)
- ✅ Windows (full support, some features require WSL2)
- ✅ macOS (full support)
- ✅ BSD (core features supported)
- ✅ Android/iOS (mobile tools available)
- ✅ Embedded/IoT (lightweight modules)
Quick Start
# Clone repository
git clone https://github.com/Lackadaisical-Security/Lackadaisical-Opsec-Anonymity-Tools.git
cd Lackadaisical-Opsec-Anonymity-Tools
# Install dependencies
pip3 install -r requirements.txt
# Make executable
chmod +x lackadaisical
# List all tools
./lackadaisical --list
# Check your privacy status
./lackadaisical privacy-check
# Full network anonymization (requires root)
sudo ./lackadaisical anonymize --full
# Generate fake identity
./lackadaisical pseudonym --full --with-backstory
# Remove metadata from files
./lackadaisical metadata-clean *.jpg --recursive
# Secure delete (DoD 7-pass)
./lackadaisical secure-delete sensitive.txt --method dod7 --verifyExample Workflows
Journalist Protection
# 1. Check for leaks
./lackadaisical privacy-check
python standalone/dns_leak_checker.py
# 2. Anonymize network
sudo ./lackadaisical anonymize --tor --vpn --dns-crypt
# 3. Generate pseudonym for source communication
./lackadaisical pseudonym --full
# 4. Remove metadata from received documents
./lackadaisical metadata-clean documents/*.pdf --recursive
# 5. Secure communication
./lackadaisical secure-messenger contact_pseudonym --listen
# 6. Secure delete originals
./lackadaisical secure-delete documents/original_* --verifyWhistleblower Kit
# 1. Full anonymization (paranoid mode)
sudo ./lackadaisical anonymize --paranoid
# 2. Counter-surveillance check
sudo ./lackadaisical counter-surveillance --full
# 3. Clean metadata from evidence
./lackadaisical metadata-clean evidence/* --recursive
# 4. Encrypt files
./lackadaisical encrypt evidence/cleaned/* --output encrypted/
# 5. Anonymous email
./lackadaisical anon-email create --provider guerrilla
# 6. Memory wipe on shutdown
./lackadaisical emergency --panicPrivacy Activist
# 1. Digital footprint analysis
./lackadaisical footprint-analyze --output footprint.txt
# 2. Spoof browser fingerprint
./lackadaisical browser-spoof --randomize
# 3. MAC randomization
sudo ./lackadaisical mac-spoof wlan0 --random
# 4. Monitor for surveillance
sudo ./lackadaisical activity-monitor --real-time
# 5. Anti-forensics on demand
./lackadaisical anti-forensics --clean-tracesBuilt-In OPSEC Features
✅ Tor integration with circuit control
✅ VPN chaining for layered protection
✅ DNS leak prevention and testing
✅ Traffic obfuscation (make VPN look like HTTPS)
✅ MAC address spoofing
✅ Encrypted credential storage (AES-256)
✅ Secure memory wiping
✅ Anti-forensics capabilities
✅ Real-time surveillance detection
✅ Browser fingerprint randomization
✅ Metadata removal (EXIF, PDF, Office)
✅ Secure file deletion (DoD, Gutmann)
Who This Is For
✅ Designed for:
- Security researchers conducting privacy audits
- Journalists protecting sources and communications
- Whistleblowers requiring maximum anonymity
- Privacy activists defending digital rights
- Penetration testers needing operational security
- Anyone who values privacy as a fundamental right
❌ NOT for:
- Illegal surveillance or stalking
- Unauthorized computer access
- Harassment or doxxing
- Corporate espionage without authorization
- Violating privacy laws
Legal & Ethical Use
This toolkit is for legitimate security testing, privacy protection, and authorized operations only.
You MUST:
- Obtain written authorization before using tools for security assessments
- Comply with all applicable laws (CFAA, GDPR, CCPA, ECPA, export controls)
- Respect data privacy and human rights
- Use tools responsibly and ethically
You will be banned and potentially reported if you:
- Use tools for unauthorized surveillance
- Conduct harassment or stalking
- Violate export control laws
- Use tools to violate human rights
If you get arrested for doing dumb shit with these tools, you're on your own.
Export Control Notice
This software contains cryptographic functionality and may be subject to U.S. Export Administration Regulations (EAR).
Prohibited destinations:
- 🚫 Cuba, Iran, North Korea, Syria
- 🚫 Crimea, Donetsk, Luhansk regions
- 🚫 Denied Persons List, Entity List, SDN List
By downloading or using this software, you agree that:
- You are not in a sanctioned country
- You are not on a restricted parties list
- You will comply with all export control laws
- You will not use this software for weapons development
For full export control details, see the LICENSE file.
Documentation
- README.md: Comprehensive project overview
- USAGE_GUIDE.md: Detailed usage instructions
- API_REFERENCE.md: Developer API documentation
- SECURITY_GUIDE.md: Security best practices
- DEPLOYMENT.md: Installation and configuration
- Module Docs: Individual module documentation
Project Status
All features are production-ready. No TODOs. No placeholders. No bullshit.
| Component | Status |
|---|---|
| Network Anonymization | ✅ 100% Complete |
| Data Security | ✅ 100% Complete |
| Identity Management | ✅ 100% Complete |
| System Protection | ✅ 100% Complete |
| Analysis & OPSEC | ✅ 100% Complete |
| Documentation | ✅ 100% Complete |
Contributing
We welcome contributions from skilled developers who respect technical excellence and privacy ethics.
Before contributing:
- Read CODE_OF_CONDUCT.md - we follow merit-based, old-school hacker ethics
- Review CONTRIBUTING.md - technical standards apply
- Check SECURITY.md - security matters
Contribution requirements:
- Production-ready code (no TODOs, no placeholders, no mocks)
- Comprehensive tests
- Security review
- Documentation
- PEP 8 compliance (Python)
If your code doesn't work, we'll tell you. If you can't handle direct technical criticism, this isn't the project for you.
Philosophy
"In a world of surveillance, anonymity is not about having something to hide, but about having something to protect—your freedom."
Privacy is a human right. This toolkit empowers individuals to reclaim control over their digital lives.
No politics. No bullshit. Just privacy tools that work.
Support & Contact
- Documentation: https://docs.lackadaisical-security.com
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Email: lackadaisicalresearch@pm.me
- XMPP+OTR: thelackadaisicalone@xmpp.jp
- Website: https://lackadaisical-security.com
Security issues: security@lackadaisical-security.com (PGP key available)
Acknowledgments
Special thanks to:
- The Tor Project (for making anonymity accessible)
- Electronic Frontier Foundation (for fighting for digital rights)
- The privacy and security research community
- All contributors and testers
- Everyone building open source privacy tools
License
This project is licensed under the MIT License with export control compliance notices.
TL;DR: Use it. Modify it. Redistribute it. Just don't blame us if you use it for illegal shit.
See LICENSE for details.
Remember: Perfect OPSEC doesn't exist. Minimize risk through layered defenses and constant vigilance.
Copyright © 2025-2026 Lackadaisical Security. All rights reserved.