https://github.com/dagnazty/evil-bw16-control-panel
A sleek and intuitive GUI built with Tkinter for managing the Evil-BW16 device, designed for ethical WiFi network testing and penetration testing.
https://github.com/dagnazty/evil-bw16-control-panel
bw16 evil-bw16 gui python
Last synced: about 1 month ago
JSON representation
A sleek and intuitive GUI built with Tkinter for managing the Evil-BW16 device, designed for ethical WiFi network testing and penetration testing.
- Host: GitHub
- URL: https://github.com/dagnazty/evil-bw16-control-panel
- Owner: dagnazty
- License: mit
- Created: 2024-12-21T00:55:35.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-04-23T13:18:39.000Z (about 1 month ago)
- Last Synced: 2025-04-23T14:14:47.086Z (about 1 month ago)
- Topics: bw16, evil-bw16, gui, python
- Language: Python
- Homepage:
- Size: 329 KB
- Stars: 20
- Watchers: 1
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
   
# ποΈ Evil-BW16 Control Panel

**β οΈ Disclaimer:**
[Evil-BW16](https://github.com/7h30th3r0n3/Evil-BW16) is crafted exclusively for **educational** and **ethical testing** purposes. **Misuse** or **illegal application** of this tool is **strictly forbidden**. The creator of Evil-BW16 **declines any liability** and is **not responsible** for any misuse or damage caused by this tool. Users must **adhere to all applicable laws** and regulations in their jurisdiction regarding network testing and ethical hacking.
---
## π Table of Contents
- [β¨ Introduction](#-introduction)
- [π Features](#-features)
- [π οΈ Requirements](#οΈ-requirements)
- [π» Software](#-software)
- [π§ Hardware](#-hardware)
- [π¦ Installation](#-installation)
- [π― Usage](#-usage)
- [π Connecting to the Device](#-connecting-to-the-device)
- [π Commands](#-commands)
- [βοΈ Setting Parameters](#-setting-parameters)
- [π― Targeting APs](#-targeting-aps)
- [π οΈ Custom Commands](#-custom-commands)
- [π System Tray](#-system-tray)
- [π License](#-license)
- [π€ Contributing](#-contributing)
- [π¬ Contact](#-contact)
- [Credits](#-credits)---
## β¨ Introduction
Welcome to the **Evil-BW16 Control Panel** β your sleek and intuitive graphical interface built with **Tkinter** for managing the powerful **Evil-BW16** device. Designed for **WiFi network testing** and **ethical hacking**, Evil-BW16 empowers you to:
- **Scan** for WiFi networks
- **Send deauthentication frames**
- **Target specific access points (APs)**
Whether you're a cybersecurity enthusiast or a professional tester, our control panel simplifies complex operations, making your ethical hacking endeavors both efficient and effective.## π Features
- **π Serial Port Management:**
- Seamlessly connect/disconnect from serial ports.
- Dynamically refresh available serial ports.- **π Command Execution:**
- Execute predefined commands: `start deauther`, `stop deauther`, `scan`, `results`, `info`, `help`, `start sniff`, `sniff beacon`, `sniff probe`, `sniff deauth`, `sniff eapol`, `sniff pwnagotchi`, `sniff all`, `stop sniff`, `hop on`, `hop off`.
- Send custom commands for experimental features.- **βοΈ Parameter Configuration:**
- Configure settings like cycle delay, scan time, number of frames, start channel, scan cycles, LED control, hop interval, sniff mode, and channel band.
- Apply multiple parameters simultaneously with ease.- **Debug and Help:**
- Toggle debug mode for detailed device diagnostics.
- Access comprehensive help documentation through the help window.- **π― Targeting APs:**
- Specify target AP indices to focus deauthentication attacks on selected networks.- **π System Tray Integration:**
- Minimize the application to the system tray.
- Easily restore or quit the application from the tray icon.- **π Device Output Logging:**
- Real-time display of device responses and logs for comprehensive monitoring.## π οΈ Requirements
### π» Software
- **Python 3.6 or Higher**
- **Libraries:**
- `customtkinter`
- `pystray`
- `Pillow`
- `pyserial`#### π₯ Installation of Python Libraries
Install the necessary Python libraries using `pip`:
```bash
pip install customtkinter pystray Pillow pyserial
```### π§ Hardware
- **π₯οΈ Evil-BW16 Device:** Ensure your Evil-BW16 hardware is properly connected to your computer via a serial connection (e.g., USB).
- **πΌοΈ Icon File:** An `icon.ico` file is required for the application and system tray icons. Place this file in the same directory as the application script.## π¦ Installation
1. **π Clone the Repository:**
```bash
git clone https://github.com/dagnazty/Evil-BW16-Control-Panel.git
cd Evil-BW16-Control-Panel
```2. **π¦ Install Dependencies:**
Ensure all required Python libraries are installed as outlined in the [Requirements](#οΈ-requirements) section.
3. **πΌοΈ Prepare the Icon:**
Make sure you have an `icon.ico` file in the project directory. This icon will represent both the application window and the system tray.
## π― Usage
Launch the Evil-BW16 Control Panel with Python:
```bash
python evil_bw16_gui.py
```### π Connecting to the Device
1. **π‘ Select Serial Port:**
- Choose the appropriate COM port from the "Serial Port" dropdown connected to your Evil-BW16 device.
- Click the "Refresh" button to update the list of available ports.2. **π’ Select Baud Rate:**
- Select the desired baud rate from the "Baud Rate" dropdown. The default is `115200`.3. **π Connect:**
- Click the "Connect" button to establish a connection with the device.
- On successful connection, the status label will display "Connected" in green.### π Commands
Interact with your device using predefined command buttons:
- **β‘ Start Deauther:** Initiates the deauthentication attack cycle.
- **βΉοΈ Stop Deauther:** Halts the deauthentication attack cycle.
- **π Scan:** Conducts a WiFi scan to detect available networks.
- **π Results:** Retrieves and displays the latest scan results.
- **π Disassoc:** Begins continuous disassociation attacks.
- **π² Random Attack:** Performs a random attack on a selected AP.
- **β±οΈ Attack Time:** Starts a timed attack.
- **ποΈ Start Sniff:** Enables the sniffer with ALL mode.
- **π Sniff Beacon:** Toggles beacon capture.
- **π‘ Sniff Probe:** Toggles probe requests/responses.
- **β‘ Sniff Deauth:** Toggles deauth/disassoc frames.
- **π Sniff EAPOL:** Toggles EAPOL frames.
- **π€ Sniff Pwnagotchi:** Toggles Pwnagotchi beacons.
- **π Sniff All:** Toggles all frames.
- **βΉοΈ Stop Sniff:** Stops sniffing.
- **π Hop On:** Enables channel hopping.
- **βΈοΈ Hop Off:** Disables channel hopping.
- **βΉοΈ Info:** Shows the current configuration of the device.
- **β Help:** Lists available commands and their descriptions.### βοΈ Setting Parameters
Customize device parameters in the "Set Parameters" section:
- **β±οΈ Cycle Delay (ms):** Time delay between scan/deauthentication cycles.
- **β²οΈ Scan Time (ms):** Duration of each WiFi scan.
- **π Num Frames:** Number of deauthentication frames sent per AP.
- **π‘ Start Channel:** Starting channel for scanning (e.g., `1` for 2.4GHz or `36` for 5GHz).
- **π Scan Between Cycles:** Toggle scanning between attack cycles (`on` or `off`).
- **π‘ LEDs:** Control the device LEDs (`on` or `off`).
- **π Hop Interval (ms):** Time interval for channel hopping.
- **π Sniff Mode:** Select the sniffing mode (e.g., `beacon`, `probe`, `deauth`, `eapol`, `pwnagotchi`, `all`).
- **π‘ Channel Band:** Select the channel band (e.g., `2.4GHz`, `5GHz`).Click the **"Apply"** button to send the configured parameters to the device.
### π― Targeting APs
Focus your attacks on specific APs in the "Target APs" section:
1. **π’ Enter Target Indices:**
- Input comma-separated indices corresponding to the APs listed in the scan results (e.g., `1,3,5`).2. **π― Set Target:**
- Click the **"Set Target"** button to configure the device to target the specified APs.### π οΈ Custom Commands
Experiment with advanced features using the "Custom Command" section:
1. **βοΈ Enter Command:**
- Type any arbitrary command in the "Command" entry field.2. **π Send Command:**
- Click the **"Send"** button to transmit the custom command to the device.**β οΈ Note:** Use this feature with caution. Sending unknown or malformed commands may disrupt device functionality.
### π System Tray
Manage the application conveniently via the system tray icon:
- **π½ Minimize to Tray:**
- Click the "X" button to hide the main window in the system tray.- **π Tray Menu:**
- **Show:** Restore the main application window.
- **Quit:** Exit the application completely._All tray and window icons utilize the `icon.ico` file for a consistent look and feel._
## π License
This project is licensed under the [MIT License](LICENSE).
## π€ Contributing
We welcome contributions! Follow these steps to contribute:
1. **π΄ Fork the Repository**
2. **πΏ Create a Feature Branch**
```bash
git checkout -b feature/YourFeature
```3. **πΎ Commit Your Changes**
```bash
git commit -m "Add some feature"
```4. **π€ Push to the Branch**
```bash
git push origin feature/YourFeature
```5. **π Open a Pull Request**
Please ensure your code adheres to the project's coding standards and includes appropriate documentation.
## Credits
- **Developers:**
- [7h30th3r0n3](https://github.com/7h30th3r0n3)
- [dagnazty](https://github.com/dagnazty)
- [Hosseios](https://github.com/Hosseios)---
**π Stay Ethical. Use Responsibly.**