Device Identity Spoofing & Evasion Framework
IMEI Modification β’ Device Fingerprinting β’ Baseband Tools β’ Anti-Tracking
NullSec Phantom ID is a comprehensive device identity evasion framework designed for security researchers and authorized red team operations. It provides tools for analyzing and modifying device identifiers to test tracking resistance and conduct authorized penetration testing.
| Feature | Description |
|---|---|
| π± IMEI Analysis | Decode, validate, generate IMEIs |
| π§ Baseband Tools | AT command interface, modem control |
| π Device Fingerprinting | Modify Android/iOS device profiles |
| π‘ Radio Identity | IMSI, ICCID manipulation tools |
| π Anti-Tracking | Evade device-based tracking systems |
| π₯οΈ Serial Spoofing | Hardware serial number tools |
# Analyze IMEI structure
phantom-id imei analyze 353456789012345
# Validate IMEI checksum
phantom-id imei validate 353456789012345
# Generate valid IMEI for testing
phantom-id imei generate --manufacturer samsung --model s23
# Generate batch for research
phantom-id imei batch --count 100 --output imeis.txt# List available profiles
phantom-id profile list
# Apply Android profile
phantom-id profile apply android-pixel-8
# Apply iOS profile
phantom-id profile apply ios-iphone-15
# Custom profile
phantom-id profile custom \
--manufacturer "Samsung" \
--model "SM-G998B" \
--android-id "abc123def456"# Connect to modem
phantom-id baseband connect /dev/ttyUSB0
# Send AT commands
phantom-id baseband at "AT+CGSN"
# Read current IMEI
phantom-id baseband read-imei
# Interactive mode
phantom-id baseband shell# IMSI analysis
phantom-id radio imsi-decode 310260123456789
# ICCID generator
phantom-id radio iccid-generate --provider verizon
# Network identity scan
phantom-id radio scan# Build from source
cargo build --release
# Install
sudo cp target/release/phantom-id /usr/local/bin/- Qualcomm devices (via QPST/QFIL)
- MediaTek devices (via SP Flash Tool hooks)
- Samsung (via engineering modes)
- Quectel EC25/EG25
- Sierra Wireless
- Huawei HiLink
- ZTE MF series
- Software Defined Radios (for analysis only)
- Baseband debug interfaces
- JTAG/SWD for modem chips
This tool is provided for authorized security research only.
- Modifying IMEI is illegal in most countries
- Use only on devices you own or have authorization to test
- This tool is for educational and research purposes
- The authors are not responsible for misuse
- Testing device tracking resistance
- Mobile forensics research
- Cellular network security assessment
- Anti-fraud system testing
- Device identity privacy research
bad-antics β’ Part of NullSec Linux