eth0
Disconnected
CAP
IDS
MITM
DNS
WIDS
WiFi:
0
BLE:
0
Connect
Claude
OpenAI
Gemini
cfg
Key
*
Model
Tokens
System Prompt
Chat
Alerts
0
Control
Recon
Map
Rules
Files
Terminal
Packets
Analyze Traffic
Network Map
TCP Connections
ARP Table
Analyze WiFi
Analyze BLE
Analyze PCAP File
eth0 AI console. Connect to COM port, configure API key, then chat or use context buttons.
Refresh
Live: Off
All
CRIT only
WARN+
Unacked
Ack All
Clear
AI Triage
Export
0 alerts
-
Captured
-
Sent
-
TCP
-
UDP
-
ARP
-
ICMP
Capture
Start
Stop
MitM (ARP Poison)
Start
Stop
DNS Spoof
Start All
Stop
Modules
IDS
On
Off
Poison
On
Off
DHCP Starve
Start
Stop
Wireless
WiFi
Scan
Auto 30s
Auto Off
BLE
Scan 5s
Scan 10s
WIDS (Wireless Attack Detector)
Start (60s learn)
Quick (30s)
Stop
Clear
Disabled
Detection Modules:
Evil Twin
Channel Hop
Enc Downgrade
New Networks
Flood
Jamming
BLE Trackers
Miss thresh:
Flood thresh:
Recon
ARP Sweep
Kill Conns
Network Discovery
ARP Sweep
mDNS/NBNS
LLDP/CDP
OS Fingerprint
VLAN Discovery
STP Topology
Port Scan / Service Scan
SYN Scan
Service Scan
NBSTAT Query
Kasa Query
Wireless
WiFi Scan
WiFi List
BLE Scan (5s)
BLE List
Network Map / Info
Network Map
Packet Stats
IDS Stats
ARP Table
TCP Connections
Refresh
Live: Off
ARP Sweep First
Reset View
Connect to device and run ARP sweep to discover hosts
Refresh
Export JSON
Import JSON
Save to SD
Load from SD
Clear All
0 rules
src-ip
dst-ip
src-port
dst-port
proto
payload (hex)
src-mac
dst-mac
ethertype
arp-op
warn
info
crit
Add Rule
Refresh
SD Card Files
Save
Delete
Reload
Refresh
Auto: Off
Send to AI
All
TCP
UDP
ICMP
ARP
0 packets
Time
Proto
Info
Len
Port Scan (SYN)
Service Scan + Banners
NetBIOS Query
MitM (ARP Poison)
Kill All Connections
Add IDS Rule
Copy IP
Ask AI About Host
pcap
Send