Skip to content

v1.0.0 Lackadaisical Opsec and Anonymity Toolkit

Latest

Choose a tag to compare

@Lackadaisical-Security Lackadaisical-Security released this 29 Jan 16:54
· 1 commit to main since this release
55615a9

Lackadaisical OPSec and Anonymity Toolkit - Public Release

Version 1.0.0 | Production Ready | Zero Bullshit

Your privacy is under attack. This is your counteroffensive.

The Lackadaisical OPSec and Anonymity Toolkit is a production-grade suite of 27+ privacy, anonymity, and operational security tools built for security professionals, journalists, privacy activists, researchers, and anyone who refuses to be surveilled.

Website: https://lackadaisical-security.com
GitHub: https://github.com/Lackadaisical-Security/Lackadaisical-Opsec-Anonymity-Tools
License: MIT (with export control compliance notices)


What Makes This Different?

Zero placeholders. Zero mock code. Zero "TODO" comments. Zero compromises.

This isn't a proof-of-concept GitHub repo with placeholder functions and aspirational README files. Every tool is production-ready, battle-tested, and actually works. If it's documented, it's implemented. Period.


Core Capabilities

🌐 Network Anonymization (9 Tools)

Full control over your network footprint:

  • Tor Controller: Complete Tor integration with circuit management, identity rotation, connection monitoring
  • DNS-over-HTTPS: Secure DNS with DoH support, multiple providers, leak prevention
  • VPN Chaining: Multi-hop VPN configuration for layered anonymity
  • DNS Leak Tester: Verify your DNS isn't leaking to your ISP
  • HTTPS Enforcer: Force HTTPS connections, detect SSL/TLS issues
  • Network Anonymizer: Automated multi-layer network anonymization
  • Traffic Analyzer: Deep packet inspection and traffic analysis
  • Packet Injector: Network packet manipulation and injection
  • MAC Spoofer: Hardware address randomization

Use case: Tor + VPN + randomized MAC + DoH = layered anonymity that actually works


🔒 Data Security (5 Tools)

Protect your data like the NSA is watching (because they might be):

  • Metadata Cleaner: Remove EXIF and metadata from images, PDFs, office documents
  • Secure Shredder: Military-grade file deletion (DoD 5220.22-M, Gutmann 35-pass)
  • Password Generator: Cryptographically secure passwords and passphrases
  • Steganography: Hide data in images, audio, and files (LSB, DCT, spread spectrum)
  • Secure Messenger: End-to-end encrypted messaging

Use case: Clean metadata → encrypt file → steganography → secure delete original


🎭 Identity Management (4 Tools)

Be anyone. Be no one:

  • Pseudonym Generator: Generate realistic fake identities with complete backstories
  • Biometric Spoofer: Generate synthetic biometric data (fingerprints, faces, voices)
  • Credential Vault: Encrypted storage for managing multiple personas
  • Browser Fingerprint Spoofer: Defeat browser fingerprinting and tracking

Use case: New identity for each operation, stored securely, fingerprintable by no one


🛡️ System Protection (5 Tools)

Monitor, harden, and protect your operational environment:

  • Activity Monitor: Real-time threat detection and system monitoring
  • Anti-Forensics: Defeat forensic analysis techniques (memory scrubbing, artifact removal)
  • Filesystem Monitor: Detect unauthorized file access and modifications
  • Privacy Check: System-wide privacy assessment and leak detection
  • Trace Removal: Clean system logs, browser history, Windows artifacts

Use case: Real-time monitoring → detect intrusion → forensic wipe → no evidence


🔍 Analysis & OPSEC (4 Tools)

Know what you're leaking before adversaries do:

  • Digital Footprint Analyzer: Comprehensive privacy exposure analysis
  • Counter-Surveillance: Detect surveillance devices, network monitoring, and eavesdropping
  • Memory Analyzer: Extract artifacts from RAM, detect malware and memory-resident threats
  • Network Scanner: Stealthy network reconnaissance with service detection

Use case: Footprint analysis → counter-surveillance → memory forensics → harden


Multi-Language Implementation

23 programming languages. One goal: your privacy.

Language Purpose
Python Main framework, most modules
C/C++/Assembly High-performance system operations
Rust Memory-safe system utilities
Go Network tools, performance-critical components
JavaScript/TypeScript Web privacy tools, browser extensions
Ruby, Perl, Lua Scripting and text processing
PowerShell, Bash System automation
.NET/C# Windows privacy utilities
Java Cross-platform GUI tools
Kotlin, Swift Android/iOS privacy tools
Scala, Elixir Distributed systems, privacy proxy
Haskell Cryptographic tools
Clojure Data anonymization
R, Julia Statistical privacy analysis
Dart Mobile privacy shield
Nim Stealth communication

Why? Because the right tool for the job matters. Network probes in Assembly are fast. Statistical analysis in R is robust. Mobile tools in Kotlin/Swift are native.


Platform Support

  • Linux (full support, recommended)
  • Windows (full support, some features require WSL2)
  • macOS (full support)
  • BSD (core features supported)
  • Android/iOS (mobile tools available)
  • Embedded/IoT (lightweight modules)

Quick Start

# Clone repository
git clone https://github.com/Lackadaisical-Security/Lackadaisical-Opsec-Anonymity-Tools.git
cd Lackadaisical-Opsec-Anonymity-Tools

# Install dependencies
pip3 install -r requirements.txt

# Make executable
chmod +x lackadaisical

# List all tools
./lackadaisical --list

# Check your privacy status
./lackadaisical privacy-check

# Full network anonymization (requires root)
sudo ./lackadaisical anonymize --full

# Generate fake identity
./lackadaisical pseudonym --full --with-backstory

# Remove metadata from files
./lackadaisical metadata-clean *.jpg --recursive

# Secure delete (DoD 7-pass)
./lackadaisical secure-delete sensitive.txt --method dod7 --verify

Example Workflows

Journalist Protection

# 1. Check for leaks
./lackadaisical privacy-check
python standalone/dns_leak_checker.py

# 2. Anonymize network
sudo ./lackadaisical anonymize --tor --vpn --dns-crypt

# 3. Generate pseudonym for source communication
./lackadaisical pseudonym --full

# 4. Remove metadata from received documents
./lackadaisical metadata-clean documents/*.pdf --recursive

# 5. Secure communication
./lackadaisical secure-messenger contact_pseudonym --listen

# 6. Secure delete originals
./lackadaisical secure-delete documents/original_* --verify

Whistleblower Kit

# 1. Full anonymization (paranoid mode)
sudo ./lackadaisical anonymize --paranoid

# 2. Counter-surveillance check
sudo ./lackadaisical counter-surveillance --full

# 3. Clean metadata from evidence
./lackadaisical metadata-clean evidence/* --recursive

# 4. Encrypt files
./lackadaisical encrypt evidence/cleaned/* --output encrypted/

# 5. Anonymous email
./lackadaisical anon-email create --provider guerrilla

# 6. Memory wipe on shutdown
./lackadaisical emergency --panic

Privacy Activist

# 1. Digital footprint analysis
./lackadaisical footprint-analyze --output footprint.txt

# 2. Spoof browser fingerprint
./lackadaisical browser-spoof --randomize

# 3. MAC randomization
sudo ./lackadaisical mac-spoof wlan0 --random

# 4. Monitor for surveillance
sudo ./lackadaisical activity-monitor --real-time

# 5. Anti-forensics on demand
./lackadaisical anti-forensics --clean-traces

Built-In OPSEC Features

Tor integration with circuit control
VPN chaining for layered protection
DNS leak prevention and testing
Traffic obfuscation (make VPN look like HTTPS)
MAC address spoofing
Encrypted credential storage (AES-256)
Secure memory wiping
Anti-forensics capabilities
Real-time surveillance detection
Browser fingerprint randomization
Metadata removal (EXIF, PDF, Office)
Secure file deletion (DoD, Gutmann)


Who This Is For

✅ Designed for:

  • Security researchers conducting privacy audits
  • Journalists protecting sources and communications
  • Whistleblowers requiring maximum anonymity
  • Privacy activists defending digital rights
  • Penetration testers needing operational security
  • Anyone who values privacy as a fundamental right

❌ NOT for:

  • Illegal surveillance or stalking
  • Unauthorized computer access
  • Harassment or doxxing
  • Corporate espionage without authorization
  • Violating privacy laws

Legal & Ethical Use

This toolkit is for legitimate security testing, privacy protection, and authorized operations only.

You MUST:

  • Obtain written authorization before using tools for security assessments
  • Comply with all applicable laws (CFAA, GDPR, CCPA, ECPA, export controls)
  • Respect data privacy and human rights
  • Use tools responsibly and ethically

You will be banned and potentially reported if you:

  • Use tools for unauthorized surveillance
  • Conduct harassment or stalking
  • Violate export control laws
  • Use tools to violate human rights

If you get arrested for doing dumb shit with these tools, you're on your own.


Export Control Notice

⚠️ U.S. Export Compliance Required

This software contains cryptographic functionality and may be subject to U.S. Export Administration Regulations (EAR).

Prohibited destinations:

  • 🚫 Cuba, Iran, North Korea, Syria
  • 🚫 Crimea, Donetsk, Luhansk regions
  • 🚫 Denied Persons List, Entity List, SDN List

By downloading or using this software, you agree that:

  1. You are not in a sanctioned country
  2. You are not on a restricted parties list
  3. You will comply with all export control laws
  4. You will not use this software for weapons development

For full export control details, see the LICENSE file.


Documentation


Project Status

All features are production-ready. No TODOs. No placeholders. No bullshit.

Component Status
Network Anonymization ✅ 100% Complete
Data Security ✅ 100% Complete
Identity Management ✅ 100% Complete
System Protection ✅ 100% Complete
Analysis & OPSEC ✅ 100% Complete
Documentation ✅ 100% Complete

Contributing

We welcome contributions from skilled developers who respect technical excellence and privacy ethics.

Before contributing:

  1. Read CODE_OF_CONDUCT.md - we follow merit-based, old-school hacker ethics
  2. Review CONTRIBUTING.md - technical standards apply
  3. Check SECURITY.md - security matters

Contribution requirements:

  • Production-ready code (no TODOs, no placeholders, no mocks)
  • Comprehensive tests
  • Security review
  • Documentation
  • PEP 8 compliance (Python)

If your code doesn't work, we'll tell you. If you can't handle direct technical criticism, this isn't the project for you.


Philosophy

"In a world of surveillance, anonymity is not about having something to hide, but about having something to protect—your freedom."

Privacy is a human right. This toolkit empowers individuals to reclaim control over their digital lives.

No politics. No bullshit. Just privacy tools that work.


Support & Contact

Security issues: security@lackadaisical-security.com (PGP key available)


Acknowledgments

Special thanks to:

  • The Tor Project (for making anonymity accessible)
  • Electronic Frontier Foundation (for fighting for digital rights)
  • The privacy and security research community
  • All contributors and testers
  • Everyone building open source privacy tools

License

This project is licensed under the MIT License with export control compliance notices.

TL;DR: Use it. Modify it. Redistribute it. Just don't blame us if you use it for illegal shit.

See LICENSE for details.


Remember: Perfect OPSEC doesn't exist. Minimize risk through layered defenses and constant vigilance.

Copyright © 2025-2026 Lackadaisical Security. All rights reserved.