██╗ ██╗██╗███████╗██╗ ██╗██╗ ██╗
██║ ██║██║██╔════╝██║ ██║╚██╗██╔╝
██║ █╗ ██║██║█████╗ ██║ ██║ ╚███╔╝
██║███╗██║██║██╔══╝ ██║ ██║ ██╔██╗
╚███╔███╔╝██║██║ ╚██████╔╝██╔╝ ██╗
╚══╝╚══╝ ╚═╝╚═╝ ╚═════╝ ╚═╝ ╚═╝
WiFuX v2.0 — WPS Security Auditing Tool for Android / Termux
WiFuX is a WPS (Wi-Fi Protected Setup) security auditing tool built for Android devices running Termux. It automates Pixie Dust and Bruteforce attacks against WPS-enabled routers, allowing security researchers and network administrators to evaluate the strength of their own wireless infrastructure.
WiFuX v2.0 is a complete rewrite of the original v1 engine, introducing a global command system, session management, reporting, improved stability, and a built-in interactive help guide — all optimized for Android / Termux.
This tool is intended for authorized security testing only. Only use it on networks you own or have explicit permission to test.
- Android device with root access (Magisk or KernelSU)
- Termux installed
- Root-capable WiFi adapter (internal wlan0 or external)
WiFuX v2.0 installs globally. Once set up, you can run it from any directory using the wifux command.
curl -sLo installer.sh https://raw.githubusercontent.com/msrofficial/WiFuX/main/installer.sh && bash installer.shThis will automatically update packages, install all dependencies, clone the repository, and register the wifux global command.
pkg update && pkg upgrade -y
pkg install root-repo git tsu python wpa-supplicant pixiewps iw -y
git clone https://github.com/msrofficial/WiFuX
cd WiFuX
chmod +x install.sh
bash install.sh| Command | Description |
|---|---|
wifux |
Run WiFuX with default settings (wlan0 + Pixie Dust) |
wifux menu |
Open WiFuX interactive menu without auto-attack |
wifux old |
Run the legacy engine (w1.py) with wlan0 |
wifux update |
Pull latest updates from GitHub |
wifux help |
Open the built-in interactive help guide |
wifux fix |
Fix root / superuser issues |
wifux contact |
Contact the developer |
Default run — scan nearby networks and attack:
wifuxPixie Dust on a specific router:
wifux -i wlan0 -b <BSSID> -KBruteforce on a specific router:
wifux -i wlan0 -b <BSSID> -BPixie Dust without touching Android WiFi settings:
wifux -i wlan0 -K --dtsResume a previous session:
wifux --list-sessions
wifux -i wlan0 --resume-session <BSSID>Generate an HTML report:
wifux -i wlan0 -b <BSSID> -K --html-reportFor the full argument reference, run wifux help and select option 5.
"No superuser binary detected"
Run the built-in fix first:
wifux fixIf the issue persists, use the dedicated fix script:
curl -sO https://raw.githubusercontent.com/msrofficial/fix-termux-root/main/fix.sh && chmod +x fix.sh && ./fix.shManual solutions: github.com/msrofficial/fix-termux-root
Common issues and fixes
| Problem | Fix |
|---|---|
| "Run it as root" error | Run su first, then retry |
| "Unable to up interface" | Check interface name with ip link show |
| wpa_supplicant crash | Run pkill wpa_supplicant, then retry |
| No WPS networks found | Disable Location/GPS, toggle WiFi off and on |
| Router keeps locking | Add -d 3 delay or use --lock-delay 120 |
| WiFi rfkill blocked | Use --handle-rfkill or run rfkill unblock wifi |
| Pixie Dust not working | Router may not be vulnerable — switch to Bruteforce (-B) |
See CHANGELOG.md for a full list of changes between versions.
WiFuX is provided for educational and authorized penetration testing purposes only. You are solely responsible for ensuring you have permission to test any network. The author is not liable for any misuse, damage, or legal consequences resulting from the use of this tool.
This project is licensed under the MIT License. See LICENSE for details.
MD Sakibur Rahman (MSR)
| Platform | Link |
|---|---|
| GitHub | msrofficial |
| sakibur.msr | |
| msr.sakibur | |
| Telegram | @msrofficial |
| Website | msrsakibur.pro.bd |
Honorable mentions include: rofl0r, Rayhan, Alamin, Sojib, Sanji, Mustakin, Sakib, rizzi
It helps the project grow and encourages further development.