Evil-BW16 is crafted exclusively for educational and ethical testing purposes. Misuse or illegal application of this tool is strictly forbidden. The creator of Evil-BW16 declines any liability and is not responsible for any misuse or damage caused by this tool. Users must adhere to all applicable laws and regulations in their jurisdiction regarding network testing and ethical hacking.
Welcome to the Evil-BW16 Control Panel – your sleek and intuitive graphical interface built with Tkinter for managing the powerful Evil-BW16 device. Designed for WiFi network testing and ethical hacking, Evil-BW16 empowers you to:
- Scan for WiFi networks
- Send deauthentication frames
- Target specific access points (APs)
Whether you're a cybersecurity enthusiast or a professional tester, our control panel simplifies complex operations, making your ethical hacking endeavors both efficient and effective.
-
🔌 Serial Port Management:
- Seamlessly connect/disconnect from serial ports.
- Dynamically refresh available serial ports.
-
📝 Command Execution:
- Execute predefined commands:
start
,stop
,scan
,results
,info
, andhelp
. - Send custom commands for experimental features.
- Execute predefined commands:
-
⚙️ Parameter Configuration:
- Configure settings like cycle delay, scan time, number of frames, start channel, scan cycles, and LED control.
- Apply multiple parameters simultaneously with ease.
-
🎯 Targeting APs:
- Specify target AP indices to focus deauthentication attacks on selected networks.
-
🔘 System Tray Integration:
- Minimize the application to the system tray.
- Easily restore or quit the application from the tray icon.
-
📜 Device Output Logging:
- Real-time display of device responses and logs for comprehensive monitoring.
- Python 3.6 or Higher
- Libraries:
tkinter
(typically included with Python)pystray
Pillow
pyserial
Install the necessary Python libraries using pip
:
pip install pystray Pillow pyserial
- 🖥️ Evil-BW16 Device: Ensure your Evil-BW16 hardware is properly connected to your computer via a serial connection (e.g., USB).
- 🖼️ Icon File: An
icon.ico
file is required for the application and system tray icons. Place this file in the same directory as the application script.
-
🔍 Clone the Repository:
git clone https://github.com/dagnazty/Evil-BW16-Control-Panel.git cd Evil-BW16-Control-Panel
-
📦 Install Dependencies:
Ensure all required Python libraries are installed as outlined in the Requirements section.
-
🖼️ Prepare the Icon:
Make sure you have an
icon.ico
file in the project directory. This icon will represent both the application window and the system tray.
Launch the Evil-BW16 Control Panel with Python:
python evil_bw16_gui.py
-
📡 Select Serial Port:
- Choose the appropriate COM port from the "Serial Port" dropdown connected to your Evil-BW16 device.
- Click the "Refresh" button to update the list of available ports.
-
🔢 Select Baud Rate:
- Select the desired baud rate from the "Baud Rate" dropdown. The default is
115200
.
- Select the desired baud rate from the "Baud Rate" dropdown. The default is
-
🔗 Connect:
- Click the "Connect" button to establish a connection with the device.
- On successful connection, the status label will display "Connected" in green.
Interact with your device using predefined command buttons:
▶️ Start: Initiates the attack cycle.- ⏹️ Stop: Halts the attack cycle.
- 🔍 Scan: Conducts a WiFi scan to detect available networks.
- 📄 Results: Retrieves and displays the latest scan results.
- ℹ️ Info: Shows the current configuration of the device.
- ❓ Help: Lists available commands and their descriptions.
Customize device parameters in the "Set Parameters" section:
- ⏱️ Cycle Delay (ms): Time delay between scan/deauthentication cycles.
- ⏲️ Scan Time (ms): Duration of each WiFi scan.
- 📊 Num Frames: Number of deauthentication frames sent per AP.
- 📡 Start Channel: Starting channel for scanning (e.g.,
1
for 2.4GHz or36
for 5GHz). - 🔄 Scan Between Cycles: Toggle scanning between attack cycles (
on
oroff
). - 💡 LEDs: Control the device LEDs (
on
oroff
).
Click the "Apply" button to send the configured parameters to the device.
Focus your attacks on specific APs in the "Target APs" section:
-
🔢 Enter Target Indices:
- Input comma-separated indices corresponding to the APs listed in the scan results (e.g.,
1,3,5
).
- Input comma-separated indices corresponding to the APs listed in the scan results (e.g.,
-
🎯 Set Target:
- Click the "Set Target" button to configure the device to target the specified APs.
Experiment with advanced features using the "Custom Command" section:
-
✏️ Enter Command:
- Type any arbitrary command in the "Command" entry field.
-
🚀 Send Command:
- Click the "Send" button to transmit the custom command to the device.
Manage the application conveniently via the system tray icon:
-
🔽 Minimize to Tray:
- Click the "X" button to hide the main window in the system tray.
-
🔄 Tray Menu:
- Show: Restore the main application window.
- Quit: Exit the application completely.
All tray and window icons utilize the icon.ico
file for a consistent look and feel.
This project is licensed under the MIT License.
We welcome contributions! Follow these steps to contribute:
-
🍴 Fork the Repository
-
🌿 Create a Feature Branch
git checkout -b feature/YourFeature
-
💾 Commit Your Changes
git commit -m "Add some feature"
-
📤 Push to the Branch
git push origin feature/YourFeature
-
🔀 Open a Pull Request
Please ensure your code adheres to the project's coding standards and includes appropriate documentation.
🔒 Stay Ethical. Use Responsibly.