Skip to content

Main#175

Open
Diyoncrz18 wants to merge 18 commits intobitbrute:masterfrom
Diyoncrz18:main
Open

Main#175
Diyoncrz18 wants to merge 18 commits intobitbrute:masterfrom
Diyoncrz18:main

Conversation

@Diyoncrz18
Copy link
Copy Markdown

No description provided.

Jordannst and others added 18 commits February 13, 2026 01:32
…urst mode - Migrate from L3 send() to L2 Ether()/ARP() pre-built frames - Use persistent conf.L2socket (open once, reuse for all sends) - Direct socket.send() bypass scapy overhead for burst injection - Add resilient error handling with auto socket recovery - Restore with retry logic (3 attempts) via temporary socket
…free - Derive gateway IPv6 link-local from MAC via EUI-64 - Send ICMPv6 RA (lifetime=0) every 4 ARP cycles to force IPv4 fallback - Send RA restore (lifetime=1800) on free for instant IPv6 recovery - Unicast to target MAC only: other devices unaffected - Closes the YouTube/QUIC IPv6 bypass vulnerability
…tus shows Limited/Blocked/Spoofed with rate info - IPv6 shows Killed when RA kill is active
…t --full kills IPv6 via RA spoof, forces IPv4 fallback - block 2 --full same for block - Without --full: normal IPv4-only limit/block (no RA kill) - free restores IPv6 only if --full was used - Updated help text with --full examples
…() with single srp() broadcast (10x faster) - Add OUI vendor lookup via netaddr (Samsung, Apple, Xiaomi, etc.) - Add Vendor column to hosts table - Scan time: ~30s ~3s for /24 network
…(5 cycles/sec) - burst 3 10 per packet type - 6 packet types: unicast reply, gratuitous broadcast, ARP request - Total: 300 ARP packets/sec per host vs old 6 pkt/sec - Specifically targets gateway-side poisoning (was failing)
…cept 0,10 (exclude gateway + self) - block all --except 0,10 - free all --except 5 - Supports ID, MAC, and IP in except list
- scan.py: 5-phase deep scan (ICMP ping sweep + ARP table read + 3x ARP
  broadcast passes + unicast ARP probe + final ARP sweep) to detect all
  devices including phones in WiFi power-save mode
- scan.py: add quick_scan() for fast single-pass mode (--quick flag)
- scan.py: increase timeout 2s -> 5s for slow routers
- scan.py: scan_for_reconnects() now also reads OS ARP table
- host.py: fix __eq__/__hash__ to compare by MAC (stable across DHCP changes)
- host.py: auto-lowercase MAC in constructor
- limit.py: fix iptables block using wrong '-t filter' syntax (filter is default)
- limit.py: fix matching cleanup in _delete_iptables_entries()
- spoof.py: increase aggressiveness (interval 0.2s->0.1s, burst 10->15)
- spoof.py: RA kill every 0.6s instead of 2s
- utils.py: get_mac_by_ip() with 3 retries + L2 srp + /proc/net/arp fallback
- utils.py: flush_network_settings() now also flushes raw table & user chains
- main_menu.py: add 'rescan' command (merge new hosts, keep existing states)
- main_menu.py: add '--quick' flag to scan command
- main_menu.py: update help text with new commands
Scanning (scan.py):
- Add passive ARP sniffing (background) to catch spontaneous traffic
- Add mDNS multicast discovery for phones, smart TVs, Chromecasts
- Add NetBIOS (NBNS) discovery for Windows PCs, printers, NAS
- Add TCP SYN probe on common ports for IoT/cameras
- Add DHCP lease file scan for sleeping devices
- Increase ARP retry passes from 3 to 5
- Add IP range filter to prevent false positives
- Reduce inter-packet delay for faster scanning

Spoofing (spoof.py):
- Add initial poison storm (50x burst) when target first added
- Implement double-tap packet sending with 10ms micro-gap
- Add ARP monitor thread for real-time gateway detection
- Add emergency re-poison (30x burst) when gateway reclaims MAC
- Add targeted re-poison when target queries gateway
- Increase burst count to 20x, reduce interval to 0.08s

Rate Limiting (limit.py):
- Add SFQ leaf qdisc for precise bandwidth shaping
- Calculate proper HTB burst size based on kernel HZ
- Add MAC-based iptables rules (survives DHCP IP changes)
- Add connmark save/restore for established connections
- Add conntrack DROP rules for blocking

Watch (watch.py):
- Reduce scan interval from 45s to 25s for faster reconnect detection

Menu (main_menu.py):
- Update help text to reflect ultra-deep scan methods
@Diyoncrz18
Copy link
Copy Markdown
Author

thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants