An open API service indexing awesome lists of open source software.

https://github.com/dagnazty/evil-bw16-control-panel

A sleek and intuitive GUI built with Tkinter for managing the Evil-BW16 device, designed for ethical WiFi network testing and penetration testing.
https://github.com/dagnazty/evil-bw16-control-panel

bw16 evil-bw16 gui python

Last synced: about 1 month ago
JSON representation

A sleek and intuitive GUI built with Tkinter for managing the Evil-BW16 device, designed for ethical WiFi network testing and penetration testing.

Awesome Lists containing this project

README

        

![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg) ![GitHub issues](https://img.shields.io/github/issues/dagnazty/Evil-BW16-Control-Panel) ![GitHub stars](https://img.shields.io/github/stars/dagnazty/Evil-BW16-Control-Panel?style=social) ![GitHub forks](https://img.shields.io/github/forks/dagnazty/Evil-BW16-Control-Panel?style=social)

# πŸŽ›οΈ Evil-BW16 Control Panel

![Evil-BW16 Logo](logo.png)

**⚠️ Disclaimer:**

[Evil-BW16](https://github.com/7h30th3r0n3/Evil-BW16) is crafted exclusively for **educational** and **ethical testing** purposes. **Misuse** or **illegal application** of this tool is **strictly forbidden**. The creator of Evil-BW16 **declines any liability** and is **not responsible** for any misuse or damage caused by this tool. Users must **adhere to all applicable laws** and regulations in their jurisdiction regarding network testing and ethical hacking.

---

## πŸ“– Table of Contents

- [✨ Introduction](#-introduction)
- [πŸš€ Features](#-features)
- [πŸ› οΈ Requirements](#️-requirements)
- [πŸ’» Software](#-software)
- [πŸ”§ Hardware](#-hardware)
- [πŸ“¦ Installation](#-installation)
- [🎯 Usage](#-usage)
- [πŸ”Œ Connecting to the Device](#-connecting-to-the-device)
- [πŸ“ Commands](#-commands)
- [βš™οΈ Setting Parameters](#-setting-parameters)
- [🎯 Targeting APs](#-targeting-aps)
- [πŸ› οΈ Custom Commands](#-custom-commands)
- [πŸ”˜ System Tray](#-system-tray)
- [πŸ“„ License](#-license)
- [🀝 Contributing](#-contributing)
- [πŸ“¬ Contact](#-contact)
- [Credits](#-credits)

---

## ✨ Introduction

Welcome to the **Evil-BW16 Control Panel** – your sleek and intuitive graphical interface built with **Tkinter** for managing the powerful **Evil-BW16** device. Designed for **WiFi network testing** and **ethical hacking**, Evil-BW16 empowers you to:

- **Scan** for WiFi networks
- **Send deauthentication frames**
- **Target specific access points (APs)**



Whether you're a cybersecurity enthusiast or a professional tester, our control panel simplifies complex operations, making your ethical hacking endeavors both efficient and effective.

## πŸš€ Features

- **πŸ”Œ Serial Port Management:**
- Seamlessly connect/disconnect from serial ports.
- Dynamically refresh available serial ports.

- **πŸ“ Command Execution:**
- Execute predefined commands: `start deauther`, `stop deauther`, `scan`, `results`, `info`, `help`, `start sniff`, `sniff beacon`, `sniff probe`, `sniff deauth`, `sniff eapol`, `sniff pwnagotchi`, `sniff all`, `stop sniff`, `hop on`, `hop off`.
- Send custom commands for experimental features.

- **βš™οΈ Parameter Configuration:**
- Configure settings like cycle delay, scan time, number of frames, start channel, scan cycles, LED control, hop interval, sniff mode, and channel band.
- Apply multiple parameters simultaneously with ease.

- **Debug and Help:**
- Toggle debug mode for detailed device diagnostics.
- Access comprehensive help documentation through the help window.

- **🎯 Targeting APs:**
- Specify target AP indices to focus deauthentication attacks on selected networks.

- **πŸ”˜ System Tray Integration:**
- Minimize the application to the system tray.
- Easily restore or quit the application from the tray icon.

- **πŸ“œ Device Output Logging:**
- Real-time display of device responses and logs for comprehensive monitoring.

## πŸ› οΈ Requirements

### πŸ’» Software

- **Python 3.6 or Higher**
- **Libraries:**
- `customtkinter`
- `pystray`
- `Pillow`
- `pyserial`

#### πŸ“₯ Installation of Python Libraries

Install the necessary Python libraries using `pip`:

```bash
pip install customtkinter pystray Pillow pyserial
```

### πŸ”§ Hardware

- **πŸ–₯️ Evil-BW16 Device:** Ensure your Evil-BW16 hardware is properly connected to your computer via a serial connection (e.g., USB).
- **πŸ–ΌοΈ Icon File:** An `icon.ico` file is required for the application and system tray icons. Place this file in the same directory as the application script.

## πŸ“¦ Installation

1. **πŸ” Clone the Repository:**

```bash
git clone https://github.com/dagnazty/Evil-BW16-Control-Panel.git
cd Evil-BW16-Control-Panel
```

2. **πŸ“¦ Install Dependencies:**

Ensure all required Python libraries are installed as outlined in the [Requirements](#️-requirements) section.

3. **πŸ–ΌοΈ Prepare the Icon:**

Make sure you have an `icon.ico` file in the project directory. This icon will represent both the application window and the system tray.

## 🎯 Usage

Launch the Evil-BW16 Control Panel with Python:

```bash
python evil_bw16_gui.py
```

### πŸ”Œ Connecting to the Device

1. **πŸ“‘ Select Serial Port:**
- Choose the appropriate COM port from the "Serial Port" dropdown connected to your Evil-BW16 device.
- Click the "Refresh" button to update the list of available ports.

2. **πŸ”’ Select Baud Rate:**
- Select the desired baud rate from the "Baud Rate" dropdown. The default is `115200`.

3. **πŸ”— Connect:**
- Click the "Connect" button to establish a connection with the device.
- On successful connection, the status label will display "Connected" in green.

### πŸ“ Commands

Interact with your device using predefined command buttons:

- **⚑ Start Deauther:** Initiates the deauthentication attack cycle.
- **⏹️ Stop Deauther:** Halts the deauthentication attack cycle.
- **πŸ” Scan:** Conducts a WiFi scan to detect available networks.
- **πŸ“„ Results:** Retrieves and displays the latest scan results.
- **πŸ›‘ Disassoc:** Begins continuous disassociation attacks.
- **🎲 Random Attack:** Performs a random attack on a selected AP.
- **⏱️ Attack Time:** Starts a timed attack.
- **πŸ‘οΈ Start Sniff:** Enables the sniffer with ALL mode.
- **πŸ” Sniff Beacon:** Toggles beacon capture.
- **πŸ“‘ Sniff Probe:** Toggles probe requests/responses.
- **⚑ Sniff Deauth:** Toggles deauth/disassoc frames.
- **πŸ”‘ Sniff EAPOL:** Toggles EAPOL frames.
- **πŸ€– Sniff Pwnagotchi:** Toggles Pwnagotchi beacons.
- **πŸ‘€ Sniff All:** Toggles all frames.
- **⏹️ Stop Sniff:** Stops sniffing.
- **πŸ”„ Hop On:** Enables channel hopping.
- **⏸️ Hop Off:** Disables channel hopping.
- **ℹ️ Info:** Shows the current configuration of the device.
- **❓ Help:** Lists available commands and their descriptions.

### βš™οΈ Setting Parameters

Customize device parameters in the "Set Parameters" section:

- **⏱️ Cycle Delay (ms):** Time delay between scan/deauthentication cycles.
- **⏲️ Scan Time (ms):** Duration of each WiFi scan.
- **πŸ“Š Num Frames:** Number of deauthentication frames sent per AP.
- **πŸ“‘ Start Channel:** Starting channel for scanning (e.g., `1` for 2.4GHz or `36` for 5GHz).
- **πŸ”„ Scan Between Cycles:** Toggle scanning between attack cycles (`on` or `off`).
- **πŸ’‘ LEDs:** Control the device LEDs (`on` or `off`).
- **πŸ”„ Hop Interval (ms):** Time interval for channel hopping.
- **πŸ” Sniff Mode:** Select the sniffing mode (e.g., `beacon`, `probe`, `deauth`, `eapol`, `pwnagotchi`, `all`).
- **πŸ“‘ Channel Band:** Select the channel band (e.g., `2.4GHz`, `5GHz`).

Click the **"Apply"** button to send the configured parameters to the device.

### 🎯 Targeting APs

Focus your attacks on specific APs in the "Target APs" section:

1. **πŸ”’ Enter Target Indices:**
- Input comma-separated indices corresponding to the APs listed in the scan results (e.g., `1,3,5`).

2. **🎯 Set Target:**
- Click the **"Set Target"** button to configure the device to target the specified APs.

### πŸ› οΈ Custom Commands

Experiment with advanced features using the "Custom Command" section:

1. **✏️ Enter Command:**
- Type any arbitrary command in the "Command" entry field.

2. **πŸš€ Send Command:**
- Click the **"Send"** button to transmit the custom command to the device.

**⚠️ Note:** Use this feature with caution. Sending unknown or malformed commands may disrupt device functionality.

### πŸ”˜ System Tray

Manage the application conveniently via the system tray icon:

- **πŸ”½ Minimize to Tray:**
- Click the "X" button to hide the main window in the system tray.

- **πŸ”„ Tray Menu:**
- **Show:** Restore the main application window.
- **Quit:** Exit the application completely.

_All tray and window icons utilize the `icon.ico` file for a consistent look and feel._

## πŸ“„ License

This project is licensed under the [MIT License](LICENSE).

## 🀝 Contributing

We welcome contributions! Follow these steps to contribute:

1. **🍴 Fork the Repository**

2. **🌿 Create a Feature Branch**

```bash
git checkout -b feature/YourFeature
```

3. **πŸ’Ύ Commit Your Changes**

```bash
git commit -m "Add some feature"
```

4. **πŸ“€ Push to the Branch**

```bash
git push origin feature/YourFeature
```

5. **πŸ”€ Open a Pull Request**

Please ensure your code adheres to the project's coding standards and includes appropriate documentation.

## Credits

- **Developers:**
- [7h30th3r0n3](https://github.com/7h30th3r0n3)
- [dagnazty](https://github.com/dagnazty)
- [Hosseios](https://github.com/Hosseios)

---

**πŸ”’ Stay Ethical. Use Responsibly.**