Evil-BW16 is a powerful and automated dual-band Wi-Fi deauther capable of targeting 2.4 GHz and 5.8 GHz networks.
It is configurable and manageable via a serial interface, allowing for precise control of scanning and deauthentication operations.
This tool is intended for educational purposes and ethical penetration testing only. Unauthorized use of this tool is illegal and strictly prohibited. The authors are not responsible for any misuse of this software.
- Dual-Band Support: Operates on both 2.4 GHz and 5 GHz Wi-Fi frequencies.
- Configurable Parameters: Adjust cycle delays, scan durations, and attack intensity.
- Targeted Attacks: Ability to select specific access points for deauthentication.
- Automated Cycles: Continuously scans and attacks based on user settings.
- Serial Control: Manage and configure the device using simple serial commands.
- LED Indicators: Provides visual feedback during operation.
- Sniffer: Sniff Beacon, Probes, Deauth, EAPOL and Pwnagotchi.
- Hardware:
- BW16 Module (https://s.click.aliexpress.com/e/_oENtnjD)
- Compatible LED indicators (optional)
- Software:
- Arduino IDE (1.8.19 or higher recommended)
- BW16 Wi-Fi Libraries
- Clone this repository to your local machine:
git clone https://github.com/yourusername/Evil-BW16.git
- Open the
Evil-BW16.ino
file in the Arduino IDE. - Install the required libraries for the BW16 module.
- Configure your settings in the code:
- Update
WIFI_SSID
,WIFI_PASS
, andWIFI_CHANNEL
to match your requirements.
- Update
- Upload the code to your BW16 module using the Arduino IDE.
Commands are sent via the serial interface to control the behavior of the device. Below is the list of supported commands:
start deauther
: Start the deauth attack cycle.stop deauther
: Stop all attack cycles.scan
: Perform a WiFi scan and display the results.results
: Show the last WiFi scan results.disassoc
: Begin continuous disassociation attacks.random_attack
: Deauth a randomly chosen AP from the scan list.attack_time <ms>
: Start a timed attack for the specified duration in milliseconds.
start sniff
: Enable the sniffer in ALL mode.sniff beacon
: Enable or disable the capture of beacon frames.sniff probe
: Enable or disable the capture of probe request/response frames.sniff deauth
: Enable or disable the capture of deauth/disassociation frames.sniff eapol
: Enable or disable the capture of EAPOL frames.sniff pwnagotchi
: Enable or disable the capture of Pwnagotchi beacons.sniff all
: Enable or disable the capture of all frame types.stop sniff
: Stop the sniffer.hop on
: Enable channel hopping.hop off
: Disable channel hopping.
set <key> <value>
: Update configuration parameters. Supported keys:ch <X>
: Set the channel to a specific valueX
.cycle_delay <ms>
: Set the delay between scan/attack cycles (in milliseconds).scan_time <ms>
: Set the scan duration (in milliseconds).num_frames
: Set the number of deauth/disassociation frames sent per AP.start_channel
: Set the starting channel for scanning (e.g.,1
for 2.4 GHz,36
for 5 GHz).scan_cycles
: Enable or disable scanning between attack cycles (on
oroff
).led
: Enable or disable LEDs (on
oroff
).target <indices>
: Specify target APs by their indices (e.g.,set target 1,3,5
).
info
: Display the current configuration settings.help
: Display the list of all available commands.
Big thx to @dagnazty for the work : https://github.com/dagnazty/Evil-BW16-Control-Panel
You should also check the fork thx to @Hosseios : https://github.com/Hosseios/Evil-BW16-Control-Panel
-
Start a Wi-Fi scan:
scan
Review the detected networks in the serial output.
-
Target specific networks:
set target 1,2
-
Begin the attack:
start
-
Stop the attack:
stop
Modify the following parameters in the code to customize the behavior:
WIFI_SSID
: SSID of the hidden access point.WIFI_PASS
: Password for the hidden access point.WIFI_CHANNEL
: Channel for the hidden access point.cycle_delay
: Delay between attack cycles (in milliseconds).scan_time
: Duration of Wi-Fi scans (in milliseconds).num_send_frames
: Number of deauthentication frames sent per AP.start_channel
: Starting channel for scanning.scan_between_cycles
: Enable/disable scanning between cycles.USE_LED
: Enable/disable LED feedback.
This tool is intended for educational purposes and ethical penetration testing only. Unauthorized use of this tool is illegal and strictly prohibited. The authors are not responsible for any misuse of this software.
https://github.com/tesa-klebeband/RTL8720dn-WiFi-Packet-Injection
Contributions are welcome! Feel free to fork this repository and submit pull requests.