Skip to content

Evil-BW16 is a dual band 2.4 Ghz and 5.8 Ghz deauther, manageable via serial, it is automated and configurable

Notifications You must be signed in to change notification settings

7h30th3r0n3/Evil-BW16

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Evil-BW16

Evil-BW16 is a powerful and automated dual-band Wi-Fi deauther capable of targeting 2.4 GHz and 5.8 GHz networks.

It is configurable and manageable via a serial interface, allowing for precise control of scanning and deauthentication operations.

Disclaimer

This tool is intended for educational purposes and ethical penetration testing only. Unauthorized use of this tool is illegal and strictly prohibited. The authors are not responsible for any misuse of this software.

Features

  • Dual-Band Support: Operates on both 2.4 GHz and 5 GHz Wi-Fi frequencies.
  • Configurable Parameters: Adjust cycle delays, scan durations, and attack intensity.
  • Targeted Attacks: Ability to select specific access points for deauthentication.
  • Automated Cycles: Continuously scans and attacks based on user settings.
  • Serial Control: Manage and configure the device using simple serial commands.
  • LED Indicators: Provides visual feedback during operation.
  • Sniffer: Sniff Beacon, Probes, Deauth, EAPOL and Pwnagotchi.

Requirements

Installation

  1. Clone this repository to your local machine:
    git clone https://github.com/yourusername/Evil-BW16.git
  2. Open the Evil-BW16.ino file in the Arduino IDE.
  3. Install the required libraries for the BW16 module.
  4. Configure your settings in the code:
    • Update WIFI_SSID, WIFI_PASS, and WIFI_CHANNEL to match your requirements.
  5. Upload the code to your BW16 module using the Arduino IDE.

Usage

Commands

Commands are sent via the serial interface to control the behavior of the device. Below is the list of supported commands:

Available Commands

[Deauther] Core Commands

  • start deauther : Start the deauth attack cycle.
  • stop deauther : Stop all attack cycles.
  • scan : Perform a WiFi scan and display the results.
  • results : Show the last WiFi scan results.
  • disassoc : Begin continuous disassociation attacks.
  • random_attack : Deauth a randomly chosen AP from the scan list.
  • attack_time <ms> : Start a timed attack for the specified duration in milliseconds.

[Sniffer] WiFi Sniffer Commands

  • start sniff : Enable the sniffer in ALL mode.
  • sniff beacon : Enable or disable the capture of beacon frames.
  • sniff probe : Enable or disable the capture of probe request/response frames.
  • sniff deauth : Enable or disable the capture of deauth/disassociation frames.
  • sniff eapol : Enable or disable the capture of EAPOL frames.
  • sniff pwnagotchi : Enable or disable the capture of Pwnagotchi beacons.
  • sniff all : Enable or disable the capture of all frame types.
  • stop sniff : Stop the sniffer.
  • hop on : Enable channel hopping.
  • hop off : Disable channel hopping.

[Configuration] Set Commands

  • set <key> <value> : Update configuration parameters. Supported keys:
    • ch <X> : Set the channel to a specific value X.
    • cycle_delay <ms> : Set the delay between scan/attack cycles (in milliseconds).
    • scan_time <ms> : Set the scan duration (in milliseconds).
    • num_frames : Set the number of deauth/disassociation frames sent per AP.
    • start_channel : Set the starting channel for scanning (e.g., 1 for 2.4 GHz, 36 for 5 GHz).
    • scan_cycles : Enable or disable scanning between attack cycles (on or off).
    • led : Enable or disable LEDs (on or off).
    • target <indices> : Specify target APs by their indices (e.g., set target 1,3,5).

[Utility] Other Commands

  • info : Display the current configuration settings.
  • help : Display the list of all available commands.

Graphical interface

Big thx to @dagnazty for the work : https://github.com/dagnazty/Evil-BW16-Control-Panel

You should also check the fork thx to @Hosseios : https://github.com/Hosseios/Evil-BW16-Control-Panel

Example Workflow

  1. Start a Wi-Fi scan:

    scan
    

    Review the detected networks in the serial output.

  2. Target specific networks:

    set target 1,2
    
  3. Begin the attack:

    start
    
  4. Stop the attack:

    stop
    

Configuration

Modify the following parameters in the code to customize the behavior:

  • WIFI_SSID: SSID of the hidden access point.
  • WIFI_PASS: Password for the hidden access point.
  • WIFI_CHANNEL: Channel for the hidden access point.
  • cycle_delay: Delay between attack cycles (in milliseconds).
  • scan_time: Duration of Wi-Fi scans (in milliseconds).
  • num_send_frames: Number of deauthentication frames sent per AP.
  • start_channel: Starting channel for scanning.
  • scan_between_cycles: Enable/disable scanning between cycles.
  • USE_LED: Enable/disable LED feedback.

Disclaimer

This tool is intended for educational purposes and ethical penetration testing only. Unauthorized use of this tool is illegal and strictly prohibited. The authors are not responsible for any misuse of this software.

Packet injection on bw16

https://github.com/tesa-klebeband/RTL8720dn-WiFi-Packet-Injection

Contributions

Contributions are welcome! Feel free to fork this repository and submit pull requests.

About

Evil-BW16 is a dual band 2.4 Ghz and 5.8 Ghz deauther, manageable via serial, it is automated and configurable

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages