LinkLiar is an intuitive status menu application written in Swift to help you spoof the MAC addresses of your Wi-Fi and Ethernet interfaces. When you turn on the Wi-Fi of your MacBook, it sends out a unique identifier - its MAC address. Everyone nearby may freely collect this unique identifier and use it to track your movement. With LinkLiar, you can achieve the same privacy for your MacBook by modifying the hardwired MAC address.
FEATURES
SIMILAR TOOLS
Akamai Guardicore Segmentation is a microsegmentation tool that provides network visibility, policy creation, and enforcement to prevent lateral movement and protect critical assets in diverse IT environments.
Network Forensic Analysis Tool for deep network traffic inspection and analysis.
A wrapper around jNetPcap for packet capturing with Clojure, available for Linux and Windows.
A tool to search for Sentry config on a page or in JavaScript files and check for blind SSRF
Arkime is an open-source network capture and analysis tool that provides comprehensive network visibility, facilitating swift identification and resolution of security and network issues.
A tool for taking a list of resolved subdomains and outputting any corresponding CNAMES en masse.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.