v2.0 - Global Installation

Advanced WiFi Hacking Tool

A powerful and automated WiFi security testing tool specifically optimized for Android devices running Termux. It evaluates the security of wireless networks by exploiting WPS vulnerabilities, seamlessly automating Pixie Dust and Brute-force attacks.

WiFuX Terminal Interface
Visitor Count

Prerequisites

Before installing WiFuX, ensure your device meets the following requirements:

Installation

WiFuX v2.0 installs globally on your system. Once installed, you can run it from any directory.

Method 1: One-Command Installation (Recommended)

Simply paste the following command into Termux to automatically download and set up everything:

curl -sLo installer.sh https://raw.githubusercontent.com/msrofficial/WiFuX/main/installer.sh && bash installer.sh

Method 2: Manual Installation

If you prefer to clone and set up the repository manually, run the following commands sequentially:

pkg update && pkg upgrade -y pkg install root-repo git tsu python wpa-supplicant pixiewps iw -y git clone https://github.com/msrofficial/WiFuX cd WiFuX chmod +x install.sh bash install.sh

Usage

Simply type the command below to run the tool from anywhere:

wifux
Click Here to Fix "No Superuser Binary Detected"

Run this command in your Termux to patch the tsu binary:

cp /data/data/com.termux/files/usr/bin/tsu /data/data/com.termux/files/usr/bin/tsu.bak && \ sed -i '281s|^SU_BINARY_SEARCH=.*|SU_BINARY_SEARCH=("/system/xbin/su" "/system/bin/su" "/debug_ramdisk/su")|' /data/data/com.termux/files/usr/bin/tsu && \ echo "✅ tsu patched successfully"

Command-Line Arguments

For advanced users who prefer passing arguments directly:

Interactive Menu (No Args) wifux
Show Help Menu wifux --help
Pixie Dust Attack wifux -i wlan0 -b <MAC> -K
Online WPS Brute-force wifux -i wlan0 -b <MAC> -B
One-Pass Auto Scanner wifux -i wlan0 --auto
Scan & Auto Attack (Loop) wifux -i wlan0 -K -l
Resume Bruteforce Session wifux -i wlan0 --resume-session <MAC>
List Saved Sessions wifux -i wlan0 --list-sessions
Signal Analysis Before Attack wifux -i wlan0 --signal-analysis
Check Target Vulnerability wifux -i wlan0 -b <MAC> --check-vuln
Detect Weak WPS Algorithms wifux -i wlan0 --detect-weak-algo
List Pixie Dust Vulnerable Routers wifux --pixie-list
List All Router Models in DB wifux --list-all-models
Generate HTML Report wifux -i wlan0 -b <MAC> -K --html-report
Change MAC on Each Attempt wifux -i wlan0 -b <MAC> -B -M
Reverse Scan Order wifux -i wlan0 -r
Update WiFuX wifux update
Contact MSR wifux contact

Troubleshooting & Notes

If you encounter issues during the attack, follow these steps:

Disclaimer

This tool is provided for educational and ethical penetration testing purposes only. You are only authorized to use WiFuX on networks that you own or have explicit permission to test. The author is not responsible for any misuse, damage, or illegal activities caused by this tool.