Spoofer programs substitute the address of the party sending a message or network requests.

These programs may be used for a range of purposes (for example, to prevent the recipient from identifying the sender or to transmit a message sent by another party).