Skip to content

Latest commit

 

History

History
100 lines (74 loc) · 3.32 KB

File metadata and controls

100 lines (74 loc) · 3.32 KB

🚀 JanOS App

LAB5-projectZero

Discord GitHub stars Last commit

A terminal-based Python controller for projectZero (JanOS) firmware over UART ⚡ Check our LAB5 Discord community.

🧭 What This Script Does

JanOS_app.py connects to a projectZero (aka JanOS) device through a serial port and provides an interactive menu:

  • Scan
  • Sniffer
  • Attacks
  • Wardrive
  • SD data

The script sends text commands to projectZero over UART (115200), parses responses, and displays live status output.

✅ Current Features

  • WiFi scanning and selection (scan_networks, show_scan_results, select_networks)
  • sniffer mode with results and probe request view

🌐 Global WiFi attacks:

  • Deauth
  • Blackout
  • WPA3 SAE Overflow
  • Handshaker
  • Portal
  • Evil Twin
  • Beacon spam (with ssids.txt management)

🕸️ Inside network attacks:

  • ARP (list_hosts + arp_ban)
  • MITM (start_pcap net)
  • Stop ALL actions

🧩 Additional modules:

  • wardrive + GPS setup
  • SD data browser
  • htmls
  • evil twin & portal (show_pass)
  • warlogs
  • handshakes
  • pcap (/sdcard/lab/pcaps, .pcap files only)

📦 Requirements

  • Python 3.10+
  • pyserial
  • serial access to your JanOS device (/dev/ttyUSB0, /dev/cu.usbserial-*, etc.)

Install dependency:

pip3 install pyserial

▶️ Usage

git clone https://github.com/D3h420/JanOS-app.git
cd JanOS-app
python3 JanOS_app.py

Or run directly with a device path:

python3 JanOS_app.py /dev/ttyUSB0

💾 SD Card Files

All paths below are on the JanOS device SD card (under /sdcard):

  • /lab/htmls/ - captive portal HTML templates used by Portal / Evil Twin / Rogue AP flows.
  • /lab/htmls/*.html - templates discovered by list_sd.
  • /lab/white.txt - whitelist BSSIDs (colon or dash separated), respected by Blackout and Sniffer Dog.
  • /lab/wardrives/wXXXX.log - WiGLE-compatible wardrive logs, auto-incremented.
  • /lab/wigle.txt - WiGLE API credentials loaded on boot (api_name:api_token, one line, no quotes).
  • /lab/wpa-sec.txt - WPA-SEC API key used for handshake uploads.
  • /lab/portals.txt - persistent CSV-like log of captive portal form submissions.
  • /lab/ssids.txt - SSID list used by Beacon Spam file mode (start_beacon_spam_ssids).
  • /lab/oui_wifi.bin - vendor lookup table streamed on demand.
  • /lab/handshakes/*.pcap - captured WPA handshake files.
  • /lab/pcaps/*.pcap - packet captures from start_pcap (radio/net mode, including MITM workflow).

🚧 Status

This project is under active development.
README reflects the current JanOS_app.py behavior.

⚠️ Disclaimer

Use only in legal lab environments and only on infrastructure you are authorized to test.