Evillimiter : Tool that Limits Bandwidth of Devices on the Same Network Without Access

Evillimiter is a tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access.

It employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network. This is explained in detail below.

Requirements

  • Linux distribution
  • Python 3 or greater

Possibly missing python packages will be installed during the installation process.

Also Read – IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

Installation

git clone https://github.com/bitbrute/evillimiter.git
cd evillimiter
sudo python3 setup.py install

Usage

Type evillimiter or python3 bin/evillimiter to run the tool.

evillimiter will try to resolve required information (network interface, netmask, gateway address, …) on its own, automatically.

Command-Line Arguments

ArgumentExplanation
-hDisplays help message listing all command-line arguments
-i [Interface Name]Specifies network interface (resolved if not specified)
-g [Gateway Address]Specifies gateway IP address (resolved if not specified)
-n [Netmask Address]Specifies netmask (resolved if not specified)
-fFlushes current iptables and tc configuration. Ensures that packets are dealt with correctly.
--colorlessDisables colored output

evillimiter Commands

CommandExplanation
scanScans your network for online hosts. One of the first things to do after start.
hostsDisplays all the hosts/devices previously scanned and basic information. Shows ID for each host that is required for interaction.
limit [ID1,ID2,...] [Rate]Limits bandwidth of host(s) associated to specified ID. Rate determines the internet speed.
Valid rates: bit, kbit, mbit, gbit, tbit
For example: limit 4,5,6 200kbit or limit all 1gbit
block [ID1,ID2,...]Blocks internet connection of host(s) associated to specified ID.
free [ID1,ID2,...]Unlimits/Unblocks host(s) associated to specified ID. Removes all further restrictions.
add [IP] (--mac [MAC])Adds custom host to host list. MAC-Address will be resolved automatically or can be specified manually.
For example: add 192.168.178.24 or add 192.168.1.50 --mac 1c:fc:bc:2d:a6:37
clearClears the terminal window.
?, helpDisplays command information similar to this one.

Restrictions

  • Limits IPv4 connctions only, since ARP spoofing requires the ARP packet that is only present on IPv4 networks.

Disclaimer

Evil Limiter is provided by bitbrute “as is” and “with all faults”. The provider makes no representations or warranties of any kind concerning the safety, suitability, lack of viruses, inaccuracies, typographical errors, or other harmful components of this software. There are inherent dangers in the use of any software, and you are solely responsible for determining whether Evil Limiter is compatible with your equipment and other software installed on your equipment. You are also solely responsible for the protection of your equipment and backup of your data, and the provider will not be liable for any damages you may suffer in connection with using, modifying, or distributing this software.

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago