This is an intuitive macOS status menu application written in Swift to help you spoof the MAC addresses of your Wi-Fi and Ethernet interfaces. It is free open-source.
If you star this project (by clicking on ✭ in the top-right corner), you help me to prioritize among my open-source projects.
If you have Homebrew, just run brew install --cask linkliar
.
To install it manually, follow these instructions in the documentation.
What you're looking at right now is the technical documentation.
The end-user documentation is located at halo.github.io/LinkLiar.
There is also a source-code documentation in progress, see bin/docs
for inspiration.
System Preferences
will still show you the original hardware MAC address.
This is normal behavior and your actual network traffic uses the new, changed MAC address.You can create this logfile and whenever it exists, all LinkLiar components will write to it:
touch "/Library/Application Support/LinkLiar/linkliar.log"
Delete the log file again to silence logging.
Once LinkLiar is started and the menu is visible, you can hold the Option ⌥ key for advanced options. This is only intended for developers.
If you want a more colorful output, clone this git repository and run bin/logs
.
That's what I use when I'm debugging.
This utility is also bundled in LinkLiar so you can run it with
# Run this in a Terminal for live debugging logs.
/Applications/LinkLiar.app/Contents/Resources/logs
To update the HelpBook (end-user documentation), change the source files in LinkLiarHelp/en.lproj and then generate the output with bin/docs
.
Link/Images.xcassets
is from Iconmonstr.MIT 2012-2021 halo. See MIT-LICENSE.