Identity Control
- Mole Desktop, Firefox, Chrome, Edge, Safari
- Bot identities including Googlebot, Bingbot, GPTBot, OAI-SearchBot, ClaudeBot, Bytespider
- Custom User-Agent override field
Mole is a Python desktop browser shell for controlled request identity, isolated cookies, redirect tracing, response inspection, and attack-surface visibility. It does not masquerade as a full modern browser engine. It behaves more like a pressure probe in a dark steel housing: compact, deliberate, and built to watch how the surface reacts when the request identity changes.
Python • Tkinter • httpx • requests • BeautifulSoupMole is aimed at analysts, operators, defenders, researchers, and curious engineers who need a lighter instrument than Chromium when testing how a target responds to different identities and request conditions. The application keeps its own storage beside the script or executable, making it useful for controlled sessions that should not bleed into daily browsing.
On Linux, install Tkinter through your package manager if it is not already present.
Mole uses Python networking and parsing libraries rather than a heavyweight embedded browser engine.
The resulting binary lands in the dist/ directory.
When frozen with PyInstaller, Mole resolves its runtime base from the executable location and writes its working data beside the binary. That keeps cookies, history, settings, cache, and saved HTML local to the release folder.
Mole occupies the narrow corridor between a simple HTTP client and a full browser. It is fast enough for controlled request work, dark enough to feel like machinery, and small enough to carry without turning every test into an opera house of browser side effects.