A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access.
Evil limiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network.
This is explained in detail below.
- Linux distribution
- Python 3 or greater
Possibly missing python packages will be installed during the installation process.
git clone https://github.com/bitbrute/evillimiter.git cd evillimiter sudo python3 setup.py install
Alternatively, you can download a desired version from the Release page.
python3 bin/evillimiter to run the tool.
evillimiter will try to resolve required information (network interface, netmask, gateway address, …) on its own, automatically.
|Displays help message listing all command-line arguments|
|Specifies network interface (resolved if not specified)|
|Specifies gateway IP address (resolved if not specified)|
|Specifies gateway MAC address (resolved if not specified)|
|Specifies netmask (resolved if not specified)|
|Flushes current iptables and tc configuration. Ensures that packets are dealt with correctly.|
|Disables colored output|
|Scans your network for online hosts. One of the first things to do after start. For example: |
|Displays all the hosts/devices previously scanned and basic information. Shows ID for each host that is required for interaction.|
|Limits bandwidth of host(s) associated to specified ID. Rate determines the internet speed.|
|Blocks internet connection of host(s) associated to specified ID.|
|Unlimits/Unblocks host(s) associated to specified ID. Removes all further restrictions.|
|Adds custom host to host list. MAC-Address will be resolved automatically or can be specified manually.|
|Clears the terminal window.|
|Quits the application.|
|Displays command information similar to this one.|
- Limits IPv4 connctions only, since ARP spoofing requires the ARP packet that is only present on IPv4 networks.