All Projects → bitbrute → Evillimiter

bitbrute / Evillimiter

Licence: mit
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.

Programming Languages

115233 projects - #7 most used programming language

Projects that are alternatives of or similar to Evillimiter

Hacking Toolkit
Stars: ✭ 635 (-16.88%)
Mutual labels:  networking, hacking, security-tools, pentesting, penetration-testing, pentest-tool
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+48.69%)
Mutual labels:  hacking, security-tools, pentesting, hacking-tool, pentest-tool
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+360.86%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing, hacking-tool
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: ✭ 2,775 (+263.22%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing, hacking-tool
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+1.44%)
Mutual labels:  hacking, security-tools, pentesting, hacking-tool, pentest-tool
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (-11.39%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-84.82%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing, hacking-tool
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+343.85%)
Mutual labels:  hacking, security-tools, penetration-testing, hacking-tool, pentest-tool
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+540.97%)
Mutual labels:  hacking-tool, pentest-tool, penetration-testing, pentesting, security-tools
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-44.11%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing, hacking-tool
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-84.82%)
Mutual labels:  hacking, security-tools, pentesting, hacking-tool, pentest-tool
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-37.96%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (-76.18%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing, hacking-tool
Web path scanner
Stars: ✭ 7,246 (+848.43%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (-32.33%)
Mutual labels:  security-tools, pentesting, hacking-tool, pentest-tool
Next generation web scanner
Stars: ✭ 3,503 (+358.51%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-5.1%)
Mutual labels:  hacking, security-tools, pentesting, hacking-tool
swiss army knife for hackers
Stars: ✭ 346 (-54.71%)
Mutual labels:  networking, hacking, pentesting, hacking-tool
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-16.75%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-50%)
Mutual labels:  hacking, security-tools, pentesting, penetration-testing

Evil Limiter

License Badge Compatibility Maintenance HitCount Open Source Love

A tool to monitor, analyze and limit the bandwidth (upload/download) of devices on your local network without physical or administrative access.
evillimiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network.

Searching for a Windows-compatible version?
Check out the open-source alternative EvilLimiter for Windows.


  • Linux distribution
  • Python 3 or greater

Possibly missing python packages will be installed during the installation process.


git clone
cd evillimiter
sudo python3 install

Alternatively, you can download a desired version from the Release page.


Type evillimiter or python3 bin/evillimiter to run the tool.

evillimiter will try to resolve required information (network interface, netmask, gateway address, ...) on its own, automatically.

Command-Line Arguments

Argument Explanation
-h Displays help message listing all command-line arguments
-i [Interface Name] Specifies network interface (resolved if not specified)
-g [Gateway IP Address] Specifies gateway IP address (resolved if not specified)
-m [Gateway MAC Address] Specifies gateway MAC address (resolved if not specified)
-n [Netmask Address] Specifies netmask (resolved if not specified)
-f Flushes current iptables and tc configuration. Ensures that packets are dealt with correctly.
--colorless Disables colored output

evillimiter Commands

Command Explanation
scan (--range [IP Range]) Scans your network for online hosts. One of the first things to do after start.
--range lets you specify a custom IP range.
For example: scan --range or just scan to scan the entire subnet.
hosts (--force) Displays all the hosts/devices previously scanned and basic information. Shows ID for each host that is required for interaction.
--force forces the table to be shown, even when it doesn't fit the terminal.
limit [ID1,ID2,...] [Rate] (--upload) (--download) Limits bandwidth of host(s) associated to specified ID. Rate determines the internet speed.
--upload limits outgoing traffic only.
--download limits incoming traffic only.
Valid rates: bit, kbit, mbit, gbit
For example: limit 4,5,6 200kbit or limit all 1gbit
block [ID1,ID2,...] (--upload) (--download) Blocks internet connection of host(s) associated to specified ID.
--upload limits outgoing traffic only
--download limits incoming traffic only.
free [ID1,ID2,...] Unlimits/Unblocks host(s) associated to specified ID. Removes all further restrictions.
add [IP] (--mac [MAC]) Adds custom host to host list. MAC-Address will be resolved automatically or can be specified manually.
For example: add or add --mac 1c:fc:bc:2d:a6:37
monitor (--interval [time in ms]) Monitors bandwidth usage of limited host(s) (current usage, total bandwidth used, ...).
--interval sets the interval after bandwidth information get refreshed in milliseconds (default 500ms).
For example: monitor --interval 1000
analyze [ID1,ID2,...] (--duration [time in s]) Analyzes traffic of host(s) without limiting to determine who uses how much bandwidth.
--duration specifies the duration of the analysis in seconds (default 30s).
For example: analyze 2,3 --duration 120
watch Shows current watch status. The watch feature detects when a host reconnects with a different IP address.
watch add [ID1,ID2,...] Adds specified host(s) to the watchlist.
For example: watch add 6,7,8
watch remove [ID1,ID2,...] Removes specified host(s) from the watchlist.
For example: watch remove all
watch set [Attribute] [Value] Changes current watch settings. The following attributes can be changed:
range is the IP range to scan for reconnects.
interval is the time to wait between each network scan (in seconds).
For example: watch set interval 120
clear Clears the terminal window.
quit Quits the application.
?, help Displays command information similar to this one.


  • Limits IPv4 connctions only, since ARP spoofing requires the ARP packet that is only present on IPv4 networks.


Evil Limiter is provided by bitbrute "as is" and "with all faults". The provider makes no representations or warranties of any kind concerning the safety, suitability, lack of viruses, inaccuracies, typographical errors, or other harmful components of this software. There are inherent dangers in the use of any software, and you are solely responsible for determining whether Evil Limiter is compatible with your equipment and other software installed on your equipment. You are also solely responsible for the protection of your equipment and backup of your data, and the provider will not be liable for any damages you may suffer in connection with using, modifying, or distributing this software.


Copyright (c) 2019 by bitbrute. Some rights reserved.
Evil Limiter is licensed under the MIT License as stated in the LICENSE file.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected]